VTUF-Collusive Piracy Prevention in P2P Content Delivery Networks full report
#1

[attachment=2772]
CONTENTS
1. AIMS AND OBJECTIVE: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery.
The main sources of illegal file sharing are peers who ignore copyright laws and collude with pirates. To solve this peer collusion problem, we propose a copyright-compliant system for legalized P2P content delivery.
Our goal is to stop collusive piracy within the boundary of a P2P content delivery network. In particular, our scheme appeals to protecting large-scale perishable contents that diminish in value as time elapses.
2. Literature Survey:
2.1 Peer-to-peer (P2P): is a general label that was originally used to identify network protocols where all the nodes have the same role and there are no nodes with a special responsibility to monitor or supervise the network behavior. Recently, the term has been mainly used to identify a family of applications that exploit the Internet to offer services where each participant acts both as a client and as a resource provider.
2.2 JAVA: Java is a programming language originally developed by James Gosling at Sun Microsystems and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities. Java applications are typically compiled to byte code that can run on any Java virtual machine (JVM) regardless of computer architecture.
2.2.1 FEATURES:
2.2.1.1 Simple: Java was designed to be easy for the professional programmer to learn and use effectively. Java has another attribute that makes it easy to learn. It makes an effort not to have surprising features.
2.2.1.2 Object-Oriented: Although influenced by its predecessors, Java was not designed to be source-code compatible with any other language. This allowed the Java team the freedom to design with a blank slate.
2.2.1.3 Robust: The multi platform environment of the web pages extraordinary demands on a program, because the program must execute reliably in a variety of systems. Thus the ability to create robust programs was given a high priority in the design of Java.
2.2.1.4 Multithreaded: Java was designed to meet the real-world requirement of creating interactive, networked programs. To accomplish this, Java supports multithreaded programming, which allows you to write programs that do many things simultaneously.
2.2.1.5 Architectural-Neutral: A central issue for the designers was that of code longevity and portability. One of the main problems facing programmers is that no guarantee exists that if you write a program today, it will run tomorrow-even on the same machine.
2.2.1.6 Interpreted and High Performance: Java enables the creation of cross-platform programs by compiling into an intermediate representation called java byte code. This code can be interpreted on any system that provides a Java Virtual Machine.
2.2.1.7 Distributed: Java is designed for the distributed environment of the Internet, because it handles TCP/IP protocols. In fact, accessing a resource using a URL is not much different from accessing a file. The original version of Java (Oak) included features for intra-address-space messaging. Eg-RMI.
2.2.1.8 Dynamic:Java programs carry with them substantial amounts of run-time type information that is used to verify and resolve accesses to objects at run time. This makes it possible to dynamically page link code in a safe and expedient manner.
3. Problem Definition: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery.
4. Overview:
4.1 EXISTING SYSTEM: PEER-TO-PEER (P2P) networks are most cost-effective in delivering large files to massive number of users. Unfortunately, todayâ„¢s P2P networks are grossly abused by illegal distributions of music, games, video streams, and popular software. These abuses have not only resulted in heavy financial loss in media and content industry, but also hindered the legal commercial use of P2P technology.
4.2 PROPOSED SYSTEM: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery.
We propose a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively.
4.3 Modules:
4.3.1 TRANSACTION SERVER: The clients first communicates transaction server to purchase the content and after client receives a digital receipt containing the content title, client ID, etc. This receipt is encrypted such that only content owner and distribution agent can decrypt. The client receives the address of the bootstrap agent as its point of contact. The joining client authenticates with the bootstrap agent using the digital receipt. Since the bootstrap agent is set up by the content owner, it decrypts the receipt and authenticates its identity.
4.3.2 PEER AUTHORIZATION TECHNIQUE: This technique provides a procedure to generate tokens for authorizes a file download access to by peers. The Peer authorization technique is formally specified for verifying the download privilege of a requesting peer before clean file chunks are shared with the requestor. If the requestor fails to present proper credentials, the client must send poisoned chunks.
4.3.3 Colluder Detection: This module is designed to tolerate the presence of colluders in the network. Because the reduced number of colluders will help to improve the system performance. Therefore we introduce a reputation-based colluder detection mechanism to secure our system from piracy. For detection the distribution agents randomly recruit clients, called decoys, to send illegal download requests to suspected peers. If an illegal request is returned with a clean file chunk, the decoy reports the collusion event and it will unauthorized the peer.
4.3.4 Private Key generator: A private key generator (PKG) is used to generate private keys for securing communication among the peers. The PKG has a similar role of a certificate authority in PKI (Public Key Infrastructure) services. The difference lies in the fact that Certificate Authority generates the private key pairs. The transaction server and PKG are only used initially when peers are joining the P2P network. In our system, file distribution and copyright protection are distributed through private keys.
5. DATA FLOW DIAGRAM:
File Name
Digital
Receipt
File
Request
Yes Client Storage Cache
No
6. Application: Knowledge Industry, Entertainment industry, Research Organization.
7. Conclusion: Finaly the scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively.
8. SOFTWARE REQUIREMENTS:
Server : Windows 2000
Client : Windows 2000/XP
Software : J2EE, JDK “ JRE
Java Technologies : Swing, Java.net
9. HARDWARE REQUIREMENTS:
Processor : PIV or higher processor
Hard Disk : 120 GB
MONITOR : SVGA Colour
Keyboard : Standard
Mouse : PS/2 Mouse
10. REFERENCES:
[1] N. Anderson, Peer-to-Peer Poisoners: A Tour of Media-Defender, Ars Technica, Sept. 2007.
[2] BitTorrent.org, BitTorrent Protocol Specification, http:// bittorrent.org /protocol.html, 2006.
[3] S. Androutsellis-Theotokis and D. Spinellis, A Survey of Peer-to-Peer Content Distribution Technologies, ACM Computing Surveys, vol. 36, pp. 335-371, 2004.
[4] D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, Proc. Advances in Cryptology (Crypto â„¢01), pp. 213-229, 2001.
[5] S. Chen and X.D. Zhang, Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery, IEEE Trans. Knowledge and Data Eng., vol. 18, no. 5, pp. 669-682, May 2006.
[6] A.K. Choudhury, N.F. Maxemchuk, S. Paul, and H.G. Schulzrinne, Copyright Protection for Electronic Publishing over Computer Networks, IEEE Trans. Networking, vol. 9, no. 3, pp. 12-20, May/June 1995.
[7] N. Christin, A.S. Weigend, and J. Chuang, Content Availability, Pollution and Poisoning in File-Sharing P2P Networks, Proc. ACM Conf. e-Commerce, pp. 68-77, 2005.
[8] E. Damiani, D.C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, A Reputation-Based Approach for Choosing
Reliable Resources in Peer-to-Peer Networks, Proc. ACM Conf. Computer and Comm. Security (CCS â„¢02), pp. 207-216, 2002.
[9] D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems, Proc. Intâ„¢l Conf. Measurement and Modeling of Computer Systems, pp. 38-49, 2005.
[10] M. Fetscherin and M. Schmid, Comparing the Usage of Digital Rights Management Systems in the Music, Film, and Print Industry, Proc. Conf. e-Commerce, 2003.

read more
http://gridsec.usc.edu/files/publication...8-2008.pdf
Reply
#2
hello im chandramohan doing mtech im looking for a project titled as Collusive Piracy Prevention in P2P Content Delivery Networks so if u hav more information about this project please mail me to charancm02[at]gmail.com
Reply
#3
hi
read more from the below thread
http://studentbank.in/report-collusive-p...rks--12788
Reply
#4
Hello friends
if any one having full reports on the project, PLZ send the page link and attachments, if any.[/font]
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: can p2p, hardware lock for software piracy project, circuit for hardware lock for software piracy project, costco proff of delivery stickers, project report on software piracy, pollution prevention in tannery, content delivery networks status and trends,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,756 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 46,877 08-01-2018, 02:33 PM
Last Post: RaymondGom
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,569 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Privacy- and Integrity-Preserving Range Queries in Sensor Networks 1 864 15-02-2017, 04:10 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 799 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 762 15-02-2017, 11:00 AM
Last Post: jaseela123d
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,764 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 42,875 03-09-2016, 11:20 AM
Last Post: jaseela123d
  Content-based image retrieval (CBIR) System project topics 15 13,756 13-05-2016, 02:30 PM
Last Post: dhanabhagya
  Employee Cubicle Management System full report computer science technology 4 5,115 07-04-2016, 11:37 AM
Last Post: dhanabhagya

Forum Jump: