Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks. Request PDF on ResearchGate | Collusive Piracy Prevention in P2P Content Delivery Networks | Collusive piracy is the main source of. Collusive Piracy Prevention in. P2P Content Delivery Networks. Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. , Authors: Xiaosong .

Author: Brakasa Kizuru
Country: Saint Kitts and Nevis
Language: English (Spanish)
Genre: Art
Published (Last): 14 March 2010
Pages: 285
PDF File Size: 10.43 Mb
ePub File Size: 18.17 Mb
ISBN: 133-7-48098-462-1
Downloads: 46279
Price: Free* [*Free Regsitration Required]
Uploader: Takree

This service is more advanced with JavaScript available, learn more at http: Knowledge and Information Systems. P2P collusive piracywhere paid P2P clients share the content with unpaid clients, has drawn significant concerns in recent years. Study on the follow relationship provides an emerging track of research in capturing the followee e. Unfortunately, existing research efforts on the follow relationship clntent online social network have largely overlooked the time constraint and the content feedback in sequential behavior pp.


Collusive Piracy Prevention in P2P Content Delivery Networks

Hence, how to consider these two characteristics for effective P2P collusive piracy prevention remains an conhent problem. In this paper, we proposed a multi-bloom filter circle to facilitate the time-constraint storage and query of Velivery sequential behaviors.

Then, a probabilistic follow with content feedback model to fast discover and quantify the probabilistic follow relationship is further developed, and then, the corresponding approach to piracy prevention is designed. The extensive experimental analysis demonstrates the capability of the proposed approach.

Skip to main content. Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy. Regular Paper First Online: This is a preview of subscription content, log in to check access. Schollmeier R A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications.

Collusive Piracy Prevention in P2P Content Delivery Networks – Semantic Scholar

J Inf Process 20 2: Policy Internet 3 2: Bellare M, Namprempre C et al Security proofs for identity-based identification and signature schemes. J Cryptol 22 1: Yoshida M, Ohzahata S et al. Comput Netw 52 6: Dugu N, Perez A Detecting social capitalists on piarcy using similarity measures.


Proceedings of the 28th ACM international conference on human factors in computing systems, pp — Google Scholar.

Armentano M, Godoy D et al Topology-based recommendation of users in micro-blogging communities. J Comput Sci Technol 27 2: ACM Sigmod Rec 32 2: Datar M, Motwani R The sliding-window computation model and results.

Data Streams — Google Collusjve. Aggarwal CC Data streams: IEEE Multimed 18 1: Comput Netw 56 3: Koenigstein N, Shavitt Y et al Measuring the validity of peer-to-peer data for information retrieval applications 56 3: Internet Math 1 4: Newman M, Girvan M Community structure in social and biological networks.

Luxburg U A tutorial on spectral clustering.

Stat Pervention 17 4: Woess W Random walks on infinite graphs and groups. Li Q, Wenjia N et al Recover fault services via complex service-to-node mappings in wireless sensor networks.

J Netw Comput Appl Cite article How to cite?