Skip to main content

Co-utile Privacy-Aware P2P Content Distribution

  • Chapter
  • First Online:
Co-utility

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 110))

  • 434 Accesses

Abstract

Multicast distribution of content is not suited to content-based electronic commerce because all buyers obtain exactly the same copy of the content, in such a way that unlawful redistributors cannot be traced. Unicast distribution has the shortcoming of requiring one connection with each buyer, but it allows the merchant to embed a different serial number in the copy obtained by each buyer, which enables redistributor tracing. Peer-to-peer (P2P) distribution is a third option which may combine some of the advantages of multicast and unicast: on the one hand, the merchant only needs unicast connections with a few seed buyers, who take over the task of further spreading the content; on the other hand, if a proper fingerprinting mechanism is used, unlawful redistributors of the P2P distributed content can still be traced. In this chapter, we describe a co-utile fingerprinting mechanism for P2P content distribution which allows redistributor tracing, while preserving the privacy of most honest buyers and offering collusion resistance and buyer frameproofness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bo, Y., Piyuan, L., Wenzheng, Z.: An efficient anonymous fingerprinting protocol. In: Computational Intelligence and Security, LNCS, vol. 4456, pp. 824–832. Springer, Berlin (2007)

    Google Scholar 

  2. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Advances in Cryptology, LNCS, vol. 963, pp. 452–465. Springer, Berlin (1995)

    Google Scholar 

  3. Camenisch, J.: Efficient anonymous fingerprinting with group signatures. In: Asiacrypt, LNCS, vol. 1976, pp. 415–428. Springer, Berlin (2000)

    Google Scholar 

  4. Chang, C.-C., Tsai, H.-C., Hsieh, Y.-P.: An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Comput. Secur. 29(2), 269–277 (2010)

    Article  Google Scholar 

  5. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)

    Article  Google Scholar 

  6. Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2008)

    Google Scholar 

  7. Domingo-Ferrer, J.: Anonymous fingerprinting of electronic information with automatic identification of redistributors. Electron. Lett. 34(13), 1303–1304 (1998)

    Article  Google Scholar 

  8. Domingo-Ferrer, J.: Anonymous fingerprinting based on committed oblivious transfer. In: Public Key Cryptography-PKC 1999, LNCS, vol. 1560, pp. 43–52. Springer, Berlin (1999)

    Google Scholar 

  9. Domingo-Ferrer, J., Herrera-Joancomartí, J.: Short collusion-secure fingerprints based on dual binary Hamming codes. Electron. Lett. 36(20), 1697–1699 (2000)

    Article  Google Scholar 

  10. Domingo-Ferrer, J., Martínez, S., Sánchez, D., Soria-Comas, J.: Co-utility: self-enforcing protocols for the mutual benefit of participants. Eng. Appl. Artif. Intell. 59, 148–158 (2017)

    Article  Google Scholar 

  11. Domingo-Ferrer, J., Megías, D.: Distributed multicast of fingerprinted content based on a rational peer-to-peer community. Comput. Commun. 36, 542–550 (2013)

    Article  Google Scholar 

  12. Domingo-Ferrer, J., Sánchez, D., Soria-Comas, J.: Co-utility: self-enforcing collaborative protocols with mutual help. Prog. Artif. Intell. 5(2), 105–110 (2016)

    Article  Google Scholar 

  13. Fallahpour, M., Megías, D.: High capacity audio watermarking using the high frequency band of the wavelet domain. Multimed. Tools Appl. 52(2), 485–498 (2011)

    Article  Google Scholar 

  14. Fallahpour, M., Megías, D.: Secure logarithmic audio watermarking scheme based on the human auditory system. Multimed. Syst. 20, 155–164 (2014)

    Article  Google Scholar 

  15. Goldberg, D.: Genetic Algorithms in Search. Optimization and Machine Learning. Addison-Wesley, Boston (1989)

    MATH  Google Scholar 

  16. Katzenbeisser, S., Lemma, A., Celik, M., van der Veen, M., Maas, M.: A buyer-seller watermarking protocol based on secure embedding. IEEE Trans. Inf. Forensics Secur. 3(4), 783–786 (2008)

    Article  Google Scholar 

  17. Kuribayashi, M.: On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol. EURASIP J. Inf. Secur. 2010, art 694797 (2010)

    Google Scholar 

  18. Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process. 13(12), 1618–1626 (2004)

    Article  Google Scholar 

  19. Megías, D.: Improved privacy-preserving P2P multimedia distribution based on recombined fingerprints. IEEE Trans. Dependable Secur. Comput. 12(2), 179–189 (2015)

    Article  Google Scholar 

  20. Megías, D., Serra-Ruiz, J., Fallahpour, M.: Efficient self-synchronised blind audio watermarking system based on time domain and FFT amplitude modification. Signal Process. 90(12), 3078–3092 (2010)

    Article  MATH  Google Scholar 

  21. Megías, D., Domingo-Ferrer, J.: DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution. In: Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2013), pp. 2376–2383 (2013)

    Google Scholar 

  22. Megías, D., Domingo-Ferrer, J.: Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints. Multimed. Syst. 20(2), 105–125 (2014)

    Article  Google Scholar 

  23. Memon, N., Wong, P.-W.: A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10(4), 643–649 (2001)

    Article  MATH  Google Scholar 

  24. Nuida, K., Fujitsu, S., Hagiwara, M., Kitagawa, T., Watanabe, H, Ogawa, K., Imai, H.: An improvement of Tardos’s collusion-secure fingerprinting codes with very short lengths. In: Proceedings of the 17th International Conference on Applied Algebra, Algebraic Algorithms and Error-correcting Codes (AAECC’07), pp. 80–89. Springer, Berlin (2007)

    Google Scholar 

  25. Pfitzmann, B., Waidner, M.: Anonymous fingerprinting. In: Advances in Cryptology-EUROCRYPT’96, LNCS, vol. 1233, pp. 88–102. Springer, Berlin (1997)

    Google Scholar 

  26. Pfitzmann, B., Sadeghi, A.-R.: Coin-based anonymous fingerprinting. In: Advances in Cryptology-EUROCRYPT’99, LNCS, vol. 1592, pp. 150–164. Springer, Berlin (1999)

    Google Scholar 

  27. Preda, R.O., Vizireanu, D.N.: Robust wavelet-based video watermarking scheme for copyright protection using the human visual system. J. Electron. Imaging 20, 13022–130030 (2011)

    Article  Google Scholar 

  28. Prins, J.P., Erkin, Z., Lagendijk, R.L.: Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J. Inf. Secur. 2007, art 20 (2007)

    Google Scholar 

  29. Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC ’03), pp. 116–125. ACM, New York (2003)

    Google Scholar 

Download references

Acknowledgements

Funding by the Templeton World Charity Foundation (grant TWCF0095/AB60 “CO-UTILITY”) is gratefully acknowledged. Also, partial support to this work has been received from the Government of Catalonia (ICREA Acadèmia Prize to J. Domingo-Ferrer and grant 2014 SGR 537), the Spanish Government (projects TIN2014-57364-C2-1-R “SmartGlacis”, TIN2015-70054-REDC and TIN2016-80250-R “Sec-MCloud”) and the European Commission (projects H2020-644024 “CLARUS” and H2020-700540 “CANVAS”). The authors are with the UNESCO Chair in Data Privacy, but the views in this work are the authors’ own and are not necessarily shared by UNESCO or any of the funding bodies.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David MegĂ­as .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Megías, D., Domingo-Ferrer, J. (2018). Co-utile Privacy-Aware P2P Content Distribution. In: Domingo-Ferrer, J., Sánchez, D. (eds) Co-utility. Studies in Systems, Decision and Control, vol 110. Springer, Cham. https://doi.org/10.1007/978-3-319-60234-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60234-9_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60233-2

  • Online ISBN: 978-3-319-60234-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics