skip to main content
10.1145/1877891.1877898acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

Access control to BitTorrent swarms using closed swarms

Published: 29 October 2010 Publication History
  • Get Citation Alerts
  • Abstract

    Peer-to-peer (P2P) technology potentially offers a promising basis for efficient, scalable and low-cost delivery of live content to large numbers of simultaneous users. However, the decentralized nature of P2P and the existence of untrusted peers makes commercial exploitation difficult. In this paper we describe Closed Swarms (CS), a P2P based content delivery system based on the BitTorrent protocols which makes it possible to differentiate between authorized and non-authorized nodes (or peers) within an overlay network. We show how Closed Swarms can be utilised as an access control mechanism to create a high quality content distribution network which provides legitimate users with an improved service over non-authorised users and which we believe may be used to drive the commercial adoption of P2P content distribution

    References

    [1]
    Stephanos Androutsellis-Theotokis and Diomidis Spinellis. A survey of peer-to-peer content distribution technologies. ACM Comput. Surv., 36(4):335--371, 2004.
    [2]
    Joonsang Baek, Jan Newmarch, Reihaneh Safavinaini, and Willy Susilo. A survey of identity-based cryptography. In Proc. of Australian Unix Users Group Annual Conference, pages 95--102, 2004.
    [3]
    Cheun Ngen Chong and Frank Kamperman. Reducing unauthorized content distribution with monitoring. In Consumer Communications and Networking Conference, 2007. CCNC 2007. 4th IEEE, pages 1053--1057, Jan. 2007.
    [4]
    Bram Cohen. Incentives build robustness in bittorrent. In Workshop on Economics of Peer-to-Peer Systems (P2PEcon'03), Berkeley, CA, June 2003, 2003.
    [5]
    Jarret Falkner, Michael Piatek, John P. John, Arvind Krishnamurthy, and Thomas Anderson. Proling a million user dht. In In Proc. of Internet Measurement Conference, 2007.
    [6]
    Arnaud Legout, Nikitas Liogkas, Eddie Kohler, and Lixia Zhang. Clustering and sharing incentives in bittorrent systems. In Proc. 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages 301--312, New York, NY, USA, 2007. ACM.
    [7]
    Xiaosong Lou and Kai Hwang. Collusive piracy prevention in p2p content delivery networks. IEEE Transactions on Computers, 58(7):970--983, 2009.
    [8]
    Xiaosong Lou, Kai Hwang, and Runfang Zhou. Integrated copyright protection in peer-to-peer networks. In Distributed Computing Systems Workshops, 2007. ICDCSW '07. 27th International Conference on, pages 28--28, June 2007.
    [9]
    J.J.D. Mol, A. Bakker, J. Pouwelse, D.H.J. Epema, and H.J. Sips. The design and deployment of a bittorrent live video streaming solution. In ISM 2009. IEEE Computer Society, December 2009.
    [10]
    G. Neglia, G. Reina, Honggang Zhang, D. Towsley, A. Venkataramani, and J. Danaher. Availability in bittorrent systems. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pages 2216--2224, May 2007.
    [11]
    P2P-Next. http://livinglab.eu/test.html.
    [12]
    P2P-Next. http://www.p2p-next.eu.
    [13]
    J. A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. H. J. Epema, M. Reinders, M. R. van Steen, and H. J. Sips. Tribler: a social-based peer-to-peer system: Research articles. Concurr. Comput. : Pract. Exper., 20(2):127--138, 2008.
    [14]
    Pablo Rodriguez, See-Mong Tan, and Christos Gkantsidis. On the feasibility of commercial, legal p2p content distribution. SIGCOMM Comput. Commun. Rev., 36(1):75--78, 2006.
    [15]
    Chen Xi. Secure media distribution in p2p networks. In ISDPE '07: Proceedings of the The First International Symposium on Data, Privacy, and E-Commerce, pages 212--214, Washington, DC, USA, 2007. IEEE Computer Society.
    [16]
    Xinwen Zhang, Dongyu Liu, Songqing Chen, Zhao Zhang, and Ravi Sandhu. Toward digital rights protection in BitTorrent-like P2P systems. In Multimedia computing and networking 2008, Proceedings of SPIE, the International Society for Optical Engineering, volume 6818, pages F.1--F.12, January 2008

    Cited By

    View all
    • (2014)Hiding user content interest while preserving P2P performanceProceedings of the 29th Annual ACM Symposium on Applied Computing10.1145/2554850.2555006(501-508)Online publication date: 24-Mar-2014
    • (2011)A New Security Architecture for BitTorrentProceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2011.58(451-455)Online publication date: 16-Nov-2011

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    AVSTP2P '10: Proceedings of the 2010 ACM workshop on Advanced video streaming techniques for peer-to-peer networks and social networking
    October 2010
    98 pages
    ISBN:9781450301695
    DOI:10.1145/1877891
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 October 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. closed swarms
    2. live streaming
    3. peer-to-peer
    4. security
    5. video-on-demand

    Qualifiers

    • Research-article

    Conference

    MM '10
    Sponsor:
    MM '10: ACM Multimedia Conference
    October 29, 2010
    Firenze, Italy

    Upcoming Conference

    MM '24
    MM '24: The 32nd ACM International Conference on Multimedia
    October 28 - November 1, 2024
    Melbourne , VIC , Australia

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)Hiding user content interest while preserving P2P performanceProceedings of the 29th Annual ACM Symposium on Applied Computing10.1145/2554850.2555006(501-508)Online publication date: 24-Mar-2014
    • (2011)A New Security Architecture for BitTorrentProceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2011.58(451-455)Online publication date: 16-Nov-2011

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media