Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
VTUF-Collusive Piracy Prevention in P2P Content Delivery Networks full report
Post: #1

1. AIMS AND OBJECTIVE: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery.
The main sources of illegal file sharing are peers who ignore copyright laws and collude with pirates. To solve this peer collusion problem, we propose a copyright-compliant system for legalized P2P content delivery.
Our goal is to stop collusive piracy within the boundary of a P2P content delivery network. In particular, our scheme appeals to protecting large-scale perishable contents that diminish in value as time elapses.
2. Literature Survey:
2.1 Peer-to-peer (P2P): is a general label that was originally used to identify network protocols where all the nodes have the same role and there are no nodes with a special responsibility to monitor or supervise the network behavior. Recently, the term has been mainly used to identify a family of applications that exploit the Internet to offer services where each participant acts both as a client and as a resource provider.
2.2 JAVA: Java is a programming language originally developed by James Gosling at Sun Microsystems and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities. Java applications are typically compiled to byte code that can run on any Java virtual machine (JVM) regardless of computer architecture.
2.2.1 FEATURES: Simple: Java was designed to be easy for the professional programmer to learn and use effectively. Java has another attribute that makes it easy to learn. It makes an effort not to have surprising features. Object-Oriented: Although influenced by its predecessors, Java was not designed to be source-code compatible with any other language. This allowed the Java team the freedom to design with a blank slate. Robust: The multi platform environment of the web pages extraordinary demands on a program, because the program must execute reliably in a variety of systems. Thus the ability to create robust programs was given a high priority in the design of Java. Multithreaded: Java was designed to meet the real-world requirement of creating interactive, networked programs. To accomplish this, Java supports multithreaded programming, which allows you to write programs that do many things simultaneously. Architectural-Neutral: A central issue for the designers was that of code longevity and portability. One of the main problems facing programmers is that no guarantee exists that if you write a program today, it will run tomorrow-even on the same machine. Interpreted and High Performance: Java enables the creation of cross-platform programs by compiling into an intermediate representation called java byte code. This code can be interpreted on any system that provides a Java Virtual Machine. Distributed: Java is designed for the distributed environment of the Internet, because it handles TCP/IP protocols. In fact, accessing a resource using a URL is not much different from accessing a file. The original version of Java (Oak) included features for intra-address-space messaging. Eg-RMI. Dynamic:Java programs carry with them substantial amounts of run-time type information that is used to verify and resolve accesses to objects at run time. This makes it possible to dynamically link code in a safe and expedient manner.
3. Problem Definition: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery.
4. Overview:
4.1 EXISTING SYSTEM: PEER-TO-PEER (P2P) networks are most cost-effective in delivering large files to massive number of users. Unfortunately, todayâ„¢s P2P networks are grossly abused by illegal distributions of music, games, video streams, and popular software. These abuses have not only resulted in heavy financial loss in media and content industry, but also hindered the legal commercial use of P2P technology.
4.2 PROPOSED SYSTEM: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery.
We propose a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively.
4.3 Modules:
4.3.1 TRANSACTION SERVER: The clients first communicates transaction server to purchase the content and after client receives a digital receipt containing the content title, client ID, etc. This receipt is encrypted such that only content owner and distribution agent can decrypt. The client receives the address of the bootstrap agent as its point of contact. The joining client authenticates with the bootstrap agent using the digital receipt. Since the bootstrap agent is set up by the content owner, it decrypts the receipt and authenticates its identity.
4.3.2 PEER AUTHORIZATION TECHNIQUE: This technique provides a procedure to generate tokens for authorizes a file download access to by peers. The Peer authorization technique is formally specified for verifying the download privilege of a requesting peer before clean file chunks are shared with the requestor. If the requestor fails to present proper credentials, the client must send poisoned chunks.
4.3.3 Colluder Detection: This module is designed to tolerate the presence of colluders in the network. Because the reduced number of colluders will help to improve the system performance. Therefore we introduce a reputation-based colluder detection mechanism to secure our system from piracy. For detection the distribution agents randomly recruit clients, called decoys, to send illegal download requests to suspected peers. If an illegal request is returned with a clean file chunk, the decoy reports the collusion event and it will unauthorized the peer.
4.3.4 Private Key generator: A private key generator (PKG) is used to generate private keys for securing communication among the peers. The PKG has a similar role of a certificate authority in PKI (Public Key Infrastructure) services. The difference lies in the fact that Certificate Authority generates the private key pairs. The transaction server and PKG are only used initially when peers are joining the P2P network. In our system, file distribution and copyright protection are distributed through private keys.
File Name
Yes Client Storage Cache
6. Application: Knowledge Industry, Entertainment industry, Research Organization.
7. Conclusion: Finaly the scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively.
Server : Windows 2000
Client : Windows 2000/XP
Software : J2EE, JDK “ JRE
Java Technologies : Swing,
Processor : PIV or higher processor
Hard Disk : 120 GB
Keyboard : Standard
Mouse : PS/2 Mouse
[1] N. Anderson, Peer-to-Peer Poisoners: A Tour of Media-Defender, Ars Technica, Sept. 2007.
[2], BitTorrent Protocol Specification, http:// /protocol.html, 2006.
[3] S. Androutsellis-Theotokis and D. Spinellis, A Survey of Peer-to-Peer Content Distribution Technologies, ACM Computing Surveys, vol. 36, pp. 335-371, 2004.
[4] D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, Proc. Advances in Cryptology (Crypto â„¢01), pp. 213-229, 2001.
[5] S. Chen and X.D. Zhang, Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery, IEEE Trans. Knowledge and Data Eng., vol. 18, no. 5, pp. 669-682, May 2006.
[6] A.K. Choudhury, N.F. Maxemchuk, S. Paul, and H.G. Schulzrinne, Copyright Protection for Electronic Publishing over Computer Networks, IEEE Trans. Networking, vol. 9, no. 3, pp. 12-20, May/June 1995.
[7] N. Christin, A.S. Weigend, and J. Chuang, Content Availability, Pollution and Poisoning in File-Sharing P2P Networks, Proc. ACM Conf. e-Commerce, pp. 68-77, 2005.
[8] E. Damiani, D.C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, A Reputation-Based Approach for Choosing
Reliable Resources in Peer-to-Peer Networks, Proc. ACM Conf. Computer and Comm. Security (CCS â„¢02), pp. 207-216, 2002.
[9] D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems, Proc. Intâ„¢l Conf. Measurement and Modeling of Computer Systems, pp. 38-49, 2005.
[10] M. Fetscherin and M. Schmid, Comparing the Usage of Digital Rights Management Systems in the Music, Film, and Print Industry, Proc. Conf. e-Commerce, 2003.

read more
Post: #2
hello im chandramohan doing mtech im looking for a project titled as Collusive Piracy Prevention in P2P Content Delivery Networks so if u hav more information about this project please mail me to charancm02[at]
Post: #3
read more from the below thread
Post: #4
Hello friends
if any one having full reports on the project, PLZ send the link and attachments, if any.[/font]

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: project performance report content, hacking prevention techniques, substance abuse prevention, digital watermarking for video piracy detection, ppt collusive piracy prevention in p2p content delivery networks ppt, injury prevention safety, hardware lock for software piracy circuit diagram,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 3,647 01-10-2016 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 39,875 03-09-2016 11:20 AM
Last Post: jaseela123
  Content-based image retrieval (CBIR) System project topics 15 11,674 13-05-2016 02:30 PM
Last Post: dhanyavp
  Employee Cubicle Management System full report computer science technology 4 3,748 07-04-2016 11:37 AM
Last Post: dhanyavp
  e-Post Office System full report computer science technology 27 22,255 30-03-2016 02:56 PM
Last Post: dhanyavp
  projects on computer networks? shakir_ali 2 651 25-01-2016 02:26 PM
Last Post: seminar report asees
  college website project full report project report tiger 28 62,706 29-11-2015 02:37 PM
Last Post: Guest
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 607 14-07-2015 02:11 PM
Last Post: seminar report asees
  steganography full report project report tiger 31 29,742 07-07-2015 02:57 PM
Last Post: seminar report asees