研究生: |
陳[王榮]州 Jung-Chou Chen |
---|---|
論文名稱: |
具版權保護之點對點網路數位內容分享系統 A Right-Protected Digital Content Sharing System on Peer-to-Peer Network |
指導教授: |
孫宏民
Hung-Min Sun |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊系統與應用研究所 Institute of Information Systems and Applications |
論文出版年: | 2005 |
畢業學年度: | 93 |
語文別: | 英文 |
論文頁數: | 44 |
中文關鍵詞: | 數位版權管理 、點對點網路 、內容分享 |
外文關鍵詞: | Digital Rights Management, Peer-to-Peer Network, content sharing |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
由於網際網路上點對點檔案共享技術的蓬勃發展,使用者之間直接分享傳輸各種資訊日益增便,尤以多媒體數位內容為甚。然而,數位內容具有容易獲得、複製及散佈於網路上的特性。在其能增益網路創作機會之時,亦相對可能被濫用、非法複製、或剽竊等。這些非法行為將衝擊網路創作者分享其作品的意願。日前盛行的點對點分享軟體(例如:Napster, Gnutella, KaZaA, 與eDonkey等)就被廣用於分享有版權之音樂、電影及軟體等。因此網路創作之智慧財產權保護已是一個重要議題。我們需要一個有效且實用的系統來保護數位內容之版權以確保其經濟價值。
有鑑於此,本論文提出一個具版權保護之點對點網路數位內容分享系統,並融入數位版權管理概念。目的為使網路創作者能因分享其創作而獲益。此系統可保護其數位內容不被未付費授權而非法使用,並於傳輸過程中可阻擋多種網路攻擊。不僅保有在Conrado et al.中所提出的系統特性、修正其缺失、並提供更為強韌之安全考量,分別為:私密性、身份確認性、資料完整性、以及不可否認性等。我們希望藉由此系統的廣用以促進網路創作之發展。
Ever since the prevalence of Peer-to-Peer (P2P) file sharing technology over the Internet, it is more convenient for users to share and transmit information directly, especially in media digital contents. However, the characteristics of digital content are easy to be obtained, duplicated, and distributed through the network. When the use of digital content allows immense opportunities for creators, the ability for anyone to make perfect copies and the ease by which those copies can be distributed also facilitate misuse, illegal copying and distribution, plagiarism, and misappropriation. These illegal behaviors potentially impact creators to hesitate to publish their digital content creation. Popular Internet software based on a peer-to-peer (P2P) architecture (such as Napster, Gnutella, KaZaA, and eDonkey) has been used to share copyrighted music, movies, software, and other materials. Thus, the protection of IPR for network creators has become an emerging issue on Peer-to-Peer network. There is a great desire for an effective and practical system that can preserve the economic value of digital content and protect the rights of the owners.
In view of this, we present a right-protected digital content sharing system on Peer-to-Peer (P2P) network and utilizing Digital Rights Management (DRM) concept. The purpose is to allow creators can make profit from sharing digital content. Our proposed system can not only protect the rights of digital content from being used illegally, but also resist several attacks during transmitting process between peers and the server. It retains useful properties as those in Conrado et al.’s system, corrects its drawbacks and provides stronger security considerations including secrecy, Authentication, Integrity, and Non-repudiation. We expect the proposed system will become popular for more and more creators to share and spread their ideas.
References
[1]Alan Au, David Loeng, Stuart Loh, “Napster v RIAA: Copyright and MP3s”, LEGT7771 IT Law, 2002.
[2]P. Biddle, P. England, M. Peinado, and B. Willman, “The darknet and the future of content distribution,” in Proc. ACM Workshop Digital Rights Management 2002.
[3]Ian Clarke, O. Sandberg, B. Wiley and T. W. Hong, “Freenet: A Distributed, Anonymous Information Storage and Retrieval System”, Workshop on Design Issues in Anonymity and Unobservability, 2000.
[4]C. Conrado, F. Kamperman, C.J. Schrijen, and W. Jonker, "Privacy in an Identity-based DRM System," IEEE Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA’03), Prague, September 2003, pp. 389-395.
[5]Yi-Feng Fu, “An Implementation of a Peer-To-Peer Reputation-based Resources Sharing System”, 2003
[6]K.P. Gummadi, R.J. Dunn, S. Saroiu, S.D. Gribble, H.M. Levy and J. Zahorjan, “Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload,” Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP-19), October 2003.
[7]J. F. Kurose and K. W. Ross (2003), Computer Networking: A Top-Down Approach Featuring the Internet, Addison Wesley, Boston.
[8]Lin, E.I.; Eskicioglu, A.M.; Lagendijk, R.L.; Delp, E.J.; “Advances in digital video content protection”, Proceedings of the IEEE, Vol.93, No.1, pp. 171 – 183, Jan. 2005.
[9]Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, ”Digital Rights Management for Content Distribution”, Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, Adelaide, Australia, Vol.21, pp. 49 – 58.
[10]Eric, Yu En Lu, “MyP2P: A Scalable Agent Based Peer-to-peer Network Platform”, 2002
[11]D. Mulligan, J. Han, A. J. Burstein, “How DRM-based content delivery systems disrupt expectations of personal use”, Proceedings of the 2003 ACM workshop on Digital rights management. Washington, DC, USA, pp. 77 - 89, October 27, 2003.
[12]Peter B., Tim W., Bart D. and Piet D. (2002), A Comparison of Peer-to-Peer Architectures, Broadband Communication Networks Group (IBCN), Department of Information Technology (INTEC), Ghent University, Belgium, 1-2.
[13]Petitcolas, F.A.P., Anderson, R.J. and Kuhn, M.G. (1998): Attacks on Copyright Marking Systems. David Aucsmith, Ed., Second workshop on information hiding, in vol. 1525 of Lecture Notes in Computer Science, Portland, Oregon, USA, pp. 218-238.
[14]Jeff Tyson (2000), Marshall Brain’s HowStuffWorks, How Napster Worked http://www.howstuffworks.com/napster1.htm
[15]Architecture of Windows Media Rights Manager, available at
http://www.microsoft.com/windows/windowsmedia/wm7/drm/architecture.aspx
[16]Choon Hoong Ding, Sarana Nutanong, Rajkumar Buyya.; (2003) : “P2P Networks for Content Sharing”, http://arxiv.org/ftp/cs/papers/0402/0402018.pdf
[17]David Barkai (2001), An Introduction to Peer-to-Peer Computing http://www.intel.com/update/departments/initech/it02012.pdf
[18]Digital Millennium Copyright Act of 1998, U.S. Copyright Office summary [Online]. Available at http://www.loc.gov/copyright/legislation/dmca.pdf
[19]Eduard Turcan (2002), Peer-to-Peer: The Third Generation Internet http://csdl.computer.org/comp/proceedings/p2p/2001/1503/00/15030095.pdf
[20]EFF (Electronic Frontier Foundation) (2001): FBI Arrests Programmer in Las Vegas. http://www.eff.org/IP/DMCA/US_v_Elcomsoft/20010717_eff_sklyarov_pr.html.
[21]Gnutella website, available at http://www.gnutella.com.
[22]Greene, T.C. (2001a): SDMI crack team launches preemptive suit. The Register, UK. http://www.heregister.co.uk/content/archive/19555.html.
[23]Internet Solutions (2001): Cryptography. http://www.tml.hut.fi/Opinnot/T-110.401/2001/Luennot/titu20011114.pdf.
[24]JXTA website, available at http://www.jxta.org.
[25]KaZaA website, available at http://www.kazaa.com/us/index.htm
[26]Martin Hebrank, Gnutella & Napster. HUH? or What do I need to know to keep from looking like an idiot http://www.wacked.org/~heller/gnutella/
[27]MetaMachin, “eDonkey2000”, http://www.edonkey2000.com/ , 2002.
[28]Microsoft Corporation (2002a): Microsoft DRM Offering, available at http://www.microsoft.com/windows/windowsmedia/wm7/drm/offering.asp.
[29]Microsoft Windows Media Digital Rights Management, available at
http://www.microsoft.com/windows/windowsmedia/drm.aspx
[30]MojoNation website, available at
http://www.mojotainment.com/mojonation/index.html, 2002.
[31]Napster website, available at http://www.napster.com.
[32]Nelson Minar (2001), Distributed Systems Topologies: Part 1, Oreilly Network, http://www.openp2p.com/pub/a/p2p/2001/12/14/topologies_one.html
[33]Stevenson F. (1999): Cryptanalysis of Contents Scrambling System. http://www-2.cs.cmu.edu/~dst/DeCSS/FrankStevenson/analysis.html
[34]Stamp, M. (2002): Digital Rights Management: The Technology Behind the Hype. Cupertino, CA. http://home.earthlink.net/~mstamp1/papers/DRMpaper.pdf
[35]The Free Network Project, website, available at http://freenet.sourceforge.net/