P2P Networks – Pirates Prevention
|© 2020 by IJCTT Journal|
|Year of Publication : 2020|
|Authors : Sudha.V.S,Sharada M Kori, Gouri C K ,Sharada G Kulkarni ,Shubhda S Kulkarni , Pankaja B Patil|
|DOI : 10.14445/22312803/IJCTT-V68I1P110|
How to Cite?
Sudha.V.S,Sharada M Kori, Gouri C K ,Sharada G Kulkarni ,Shubhda S Kulkarni , Pankaja B Patil, "P2P Networks – Pirates Prevention," International Journal of Computer Trends and Technology, vol. 68, no. 1, pp. 42-44, 2020. Crossref, https://doi.org/10.14445/22312803/IJCTT-V68I1P110
P2P networks deal with delivering large files to massive number of users. Hence piracy is the main source of violations of the content distributed within the boundary of a P2P network. The paid clients called the colluders illegally share copyrighted files with unpaid clients called pirates. We propose a technique to stop illegal file downloading by the pirates. The pirates are detected by the use of time stamped tokens assigned to each peer in the network. Detected pirates will receive poisoned chunks in their repeated attempts. We propose a content poisoning approach to stop copyright violation of P2P network. Thus pirates are not provided with a chance to download file successfully in tolerable time.
Content poisoning, P2P networks, Network security.
 S. Androutsellis-Theotokis and D. Spinellis, “A Survey of Peer-to-Peer Content Distribution Technologies,” ACM Computing Surveys
 N. Christin, A.S. Weigend, and J. Chuang, “Content Availability, Pollution and Poisoning in File-Sharing P2P Networks”
 RajkumarBuyya, Al-Mukaddim Khan Pathan, James Broberg and ZahirTari, “ A Case for peering of content Delivery Networks
 B. Krishnamurthy, C. Wills, and Y. Zhang, “On the Use and Performance of Content Distribution Networks”