Abstract
The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to peer networks like BitTorrent require new approaches to establish the needed level of trust in the overall functionality of the system.
This paper explores the integration of hardware based trust concepts from the domain of Trusted Computing in the well know BitTorrent protocol suite.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Baumgart, I., Mies, S.: S/Kademlia: A practicable approach towards secure key-based routing. In: Proceedings of the International Workshop on Peer-to-Peer Networked Virtual Environments (2007)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on information Theory 22(6), 644–654 (1976)
Einhorn, M., Madison, N.: How Advertising and Peer-to-Peer are Transforming Digital Media and Copyright. Journal of the Copyright Society (2007)
Erman, D., Ilie, D., Popescu, A.: Bittorrent session characteristics and models. Traffic Engineering, Performance Evaluation Studies and Tools for Heterogeneous Networks 61(84), 61
Fang, W., Peterson, L.: Inter-AS traffic patterns and their implications. Globecom-New York 3, 1859–1868 (1999)
Gurgens, S., Rudolph, C., Scheuermann, D., Atts, M., Plaga, R.: Security Evaluation of Scenarios Based on the TCG’s TPM Specification. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 438–453. Springer, Heidelberg (2007)
Krishnamurthy, B., Wills, C., Zhang, Y.: On the use and performance of content distribution networks. In: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, pp. 169–182. ACM, New York (2001)
Kuntze, N., Leicher, A., Schmidt, A.: Implementation of a trusted ticket system. In: Proceedings of the IFIP Security 2009 (2009)
Kuntze, N., Mähler, D., Schmidt, A.U.: Employing trusted computing for the forward pricing of pseudonyms in reputation systems. In: Axmedis 2006, Proceedings of the 2nd International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, Volume for Workshops, Industrial, and Application Sessions (2006)
Laoutaris, N., Rodriguez, P., Massoulie, L.: ECHOS: edge capacity hosting overlays of nano data centers (2008)
Liang, J., Naoumov, N., Ross, K.: The index poisoning attack in p2p file sharing systems. In: INFOCOM 2006. Proceedings of 25th IEEE International Conference on Computer Communications, pp. 1–12 (2006)
Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 2. Springer, Heidelberg (2002)
Mitchell, C., et al.: Trusted Computing, p. 1 (2005)
Pouwelse, J., Garbacki, P., Epema, D., Sips, H.: The bittorrent p2p file-sharing system: Measurements and analysis. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, pp. 205–216. Springer, Heidelberg (2005)
Stumpf, F., Fuchs, A., Katzenbeisser, S., Eckert, C.: Improving the scalability of platform attestation. In: Proceedings of the 3rd ACM workshop on Scalable trusted computing, pp. 1–10. ACM, New York (2008)
Wallach, D.: A survey of peer-to-peer security issues. LNCS, pp. 42–57. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP International Federation for Information Processing
About this paper
Cite this paper
Kuntze, N., Rudolph, C., Fuchs, A. (2010). Trust in Peer-to-Peer Content Distribution Protocols. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds) Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. WISTP 2010. Lecture Notes in Computer Science, vol 6033. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12368-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-12368-9_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12367-2
Online ISBN: 978-3-642-12368-9
eBook Packages: Computer ScienceComputer Science (R0)