By Topic

Trusted Digital Rights Management in Peer-to-Peer Communities

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Llewellyn-Jones, D. ; Sch. of Comput. & Math. Sci., Liverpool John Moores Univ., Liverpool, UK ; Merabti, M. ; Qi Shi ; Askwith, B.

Society has grown increasingly reliant on technologies that allow the reproduction of both physical and abstract entities. The ease with which content can be copied has brought widespread benefits, however in many cases these benefits are also contingent on a suitable counter balance of content protection, allowing the process of copying to be restricted in certain circumstances. Dissemination of knowledge, mass production, financial systems and privacy protection all rely on both kinds of technology. This is as true in the digital world as it has been traditionally. Moreover, the success of future computing developments, such as the move towards Ubiquitous Computing, rely on increasingly fluid movements of data throughout a networked environment, a requirement that is often seen as being in conflict with the need to be able to restrict the movement of certain rights protected data. Yet customers can be unwilling to accept stringent restrictions imposed through technological means, and a suitable balance needs to be met. In this paper we build on our previous work on community based Digital Rights Management to show how it can be applied in an existing peer-to-peer file sharing network. We extend the Gnutella peer-to-peer protocol to show how a realistic implementation of a community-based trust mechanism can be achieved. Our mechanism models the peer-to-peer network as a cellular automaton using trust as a means to regulate the illegitimate flow of data. We discuss the implementation details and the synchronisation process that we have developed based on our initial results.

Published in:

Developments in eSystems Engineering (DESE), 2009 Second International Conference on

Date of Conference:

14-16 Dec. 2009