Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 189))

  • 1870 Accesses

Abstract

This paper presents a method and its implementation proposal, built on the blind signatures protocol, to trace and report users sharing a valid license illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization. An enhancement of the protocol to identify the last usage of a certain license is also provided, allowing to detect a traitor when an unauthorized copy of a license is used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Picker, R.C.: The yin and yang of copyright and technology. Commun. ACM 55(1), 30–32 (2012)

    Article  Google Scholar 

  2. Lou, X., Hwang, K.: Collusive piracy prevention in p2p content delivery networks. IEEE Transactions on Computers 58(7), 970–983 (2009)

    Article  MathSciNet  Google Scholar 

  3. Ding, Y., Fan, L.: Traitor tracing and revocation mechanisms with privacy-preserving. In: Wang, Y., Ming Cheung, Y., Guo, P., Wei, Y. (eds.) CIS, pp. 842–846. IEEE (2011)

    Google Scholar 

  4. Kosuga, M., Yamazaki, T., Ogino, N., Matsuda, J.: Adaptive qos management using layered multi-agent system for distributed multimedia applications. In: ICPP, pp. 388–394 (1999)

    Google Scholar 

  5. Franklin, S., Graesser, A.C.: Is it an agent, or just a program?: A taxonomy for autonomous agents. In: Jennings, N.R., Wooldridge, M.J., Müller, J.P. (eds.) ECAI-WS 1996 and ATAL 1996. LNCS, vol. 1193, pp. 21–35. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  6. Silva, D., Braga, R., Reis, L., Oliveira, E.: A generic model for a robotic agent system using gaia methodology: Two distinct implementations. In: IEEE Conference on Robotics Automation and Mechatronics, RAM, pp. 280–285 (2010)

    Google Scholar 

  7. Leetch, G., Mangina, E.: A multi-agent system to stream multimedia to handheld devices. In: Sixth International Conference on Computational Intelligence and Multimedia Applications, pp. 2–10. IEEE (2005)

    Google Scholar 

  8. Trappe, W., Washington, L.: Introduction to cryptography: with coding theory. Pearson Prentice Hall (June 2006)

    Google Scholar 

  9. Kale, L., Arya, A., Bhatele, A., Gupta, A., Jain, N., Jetley, P., Lifflander, J., Miller, P., Sun, Y., Venkataraman, R., Wesolowski, L., Zheng, G.: Charm++ for productivity and performance: A submission to the 2011 HPC class II challenge. Technical Report 11-49. Parallel Programming Laboratory (November 2011)

    Google Scholar 

  10. Capel Tunon, M., Lopez, M.: A parallel programming methodology based on high level parallel compositions (cpans). In: 14th International Conference on Electronics, Communications and Computers, CONIELECOMP 2004., pp. 242–247 (February 2004)

    Google Scholar 

  11. Alvarez-Bermejo, J.A., Roca-Piera, J.: A Proposed Asynchronous Object Load Balancing Method for Parallel 3D Image Reconstruction Applications. In: Hsu, C.-H., Yang, L.T., Park, J.H., Yeo, S.-S. (eds.) ICA3PP 2010, Part I. LNCS, vol. 6081, pp. 454–462. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. Jang, M.-W., Agha, G.: Adaptive Agent Allocation for Massively Multi-agent Applications. In: Ishida, T., Gasser, L., Nakashima, H. (eds.) MMAS 2005. LNCS (LNAI), vol. 3446, pp. 25–39. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. A. Álvarez-Bermejo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Álvarez-Bermejo, J.A., López-Ramos, J.A. (2013). Tracking Traitors in Web Services via Blind Signatures. In: Herrero, Á., et al. International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions. Advances in Intelligent Systems and Computing, vol 189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33018-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33018-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33017-9

  • Online ISBN: 978-3-642-33018-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics