{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T20:49:07Z","timestamp":1778878147565,"version":"3.51.4"},"reference-count":29,"publisher":"Wiley","issue":"16","license":[{"start":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T00:00:00Z","timestamp":1515369600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"name":"This research was supported by the National Natural Science Foundation of China","award":["61402475 and 61402464"],"award-info":[{"award-number":["61402475 and 61402464"]}]},{"name":"National Key R&D Program of China","award":["2016YFB0801300"],"award-info":[{"award-number":["2016YFB0801300"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2018,11,10]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>Illegal sharing of copyrighted materials in peer\u2010to\u2010peer (P2P) networks has become a serious threat to the content industries. Despite many copyright\u2010protected P2P systems that have been designed to prevent piracy, the user authentication\u2013based approaches face the challenge of collusion attacks and the encryption\u2010based approaches may be vulnerable to poisoning attacks. Observing these, in this paper, we present a novel copyright\u2010protected content delivery scheme (CPP) for P2P file\u2010sharing networks based on piece\u2010level stochastic encryption. In CPP, peers must pay for decryption key sequences before accessing to the plaintext content. For each peer, the sequence of the decryption keys is different from others, so the unauthorized peers could not access the content even if some colluders share their keys. Modified piece with hash enable peers to check the correctness of each piece after downloading, preventing the propagation of poisoned pieces. There is neither massive state maintenance nor frequent user authentication during the download process. Peers purchase after downloading, protecting their benefits when quitting the system before paying. Analysis and experiments show that CPP is suitable for delivering large files, and it is resilience to collusion attacks and poisoning attacks.<\/jats:p>","DOI":"10.1002\/dac.3476","type":"journal-article","created":{"date-parts":[[2018,1,10]],"date-time":"2018-01-10T10:10:22Z","timestamp":1515579022000},"source":"Crossref","is-referenced-by-count":4,"title":["An effective copyright\u2010protected content delivery scheme for P2P file sharing networks"],"prefix":"10.1002","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7477-2140","authenticated-orcid":false,"given":"Majing","family":"Su","sequence":"first","affiliation":[{"name":"Institute of Information Engineering CAS Beijing China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8167-7106","authenticated-orcid":false,"given":"Hongli","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Harbin Institute of Technology Harbin China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9513-9990","authenticated-orcid":false,"given":"Md Zakirul Alam","family":"Bhuiyan","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences Fordham University New York NY USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4235-9671","authenticated-orcid":false,"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences Temple University Philadelphia PA USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9518-5914","authenticated-orcid":false,"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering CAS Beijing China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","published-online":{"date-parts":[[2018,1,8]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"IFPI.DMR 2011. [Online] 2011. Avaliable:http:\/\/www.ifpi.org\/content\/section_resources\/dmr2011.html"},{"key":"e_1_2_7_3_1","unstructured":"MeeJ WattersPA.Detecting and tracing copyright infringements in P2P networks. inProc. ICN\/ICONS\/MCL'06 Morne Mauritius 2006."},{"key":"e_1_2_7_4_1","doi-asserted-by":"crossref","unstructured":"ChowKP ChengKY ManLY et al.BTM\u2010an automated rule\u2010based BT monitoring system for piracy detection. inProc. ICIMP 2007","DOI":"10.1109\/ICIMP.2007.10"},{"key":"e_1_2_7_5_1","doi-asserted-by":"crossref","unstructured":"ShermanA StavrouA NiehJ KeromytisAD SteinC.Adding trust to P2P distribution of paid content. inProc. ISC'09 Pisa Italy 2009;459\u2010474.","DOI":"10.1007\/978-3-642-04474-8_36"},{"key":"e_1_2_7_6_1","doi-asserted-by":"crossref","unstructured":"ChenJ YueY.Bootstrapping a blockchain based ecosystem for big data exchange.2017 IEEE International Congress on Big Data (BigData Congress) Honolulu Hi 2017;460\u2010463.","DOI":"10.1109\/BigDataCongress.2017.67"},{"key":"e_1_2_7_7_1","doi-asserted-by":"crossref","unstructured":"ZhangX LiuD ChenS ZhangZ SandhuR.Towards digital rights protection in BitTorrent\u2010like P2P systems. inProc. SPIE\/ACM Multimedia Comput. and Networking San Jose CA USA 2008.","DOI":"10.1117\/12.775129"},{"key":"e_1_2_7_8_1","doi-asserted-by":"crossref","unstructured":"ChenYY JanJK ChiYY TsaiML.A feasible DRM mechanism for BT\u2010like P2P system. inProc. IEEC'09 Ternopil Ukraine 2009;323\u2010327.","DOI":"10.1109\/IEEC.2009.73"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.26"},{"key":"e_1_2_7_10_1","doi-asserted-by":"crossref","unstructured":"YuHY ChenJJ WenJY LeeSC.Design and implementation of a DRM\u2010enabled and stable P2P\u2010IPTV system.2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW) Chengdu 2014;1\u20106.","DOI":"10.1109\/ICMEW.2014.6890643"},{"key":"e_1_2_7_11_1","doi-asserted-by":"crossref","unstructured":"SungJY JeongJY YoonKS.DRM enabled P2P architecture advanced communication technology. inProc. ICACT 2006 Phoenix Park Korea 2006;487\u2010490.","DOI":"10.1109\/ICACT.2006.206014"},{"key":"e_1_2_7_12_1","doi-asserted-by":"crossref","unstructured":"QiuQ TangZ YuYY.A decentralized authorization scheme for DRM in P2P file\u2010sharing systems. inProc. IEEE CNCC 2011 Las Vegas NV USA 2011;136\u2010140.","DOI":"10.1109\/CCNC.2011.5766438"},{"key":"e_1_2_7_13_1","doi-asserted-by":"crossref","unstructured":"TsolisD SioutasS PanaretosA KarydisI OikonomouK.Decentralized digital content exchange and copyright protection via P2P networks. inProc. ICSS 2011 Corfu Greece 2011;1056\u20101061.","DOI":"10.1109\/ISCC.2011.5983982"},{"key":"e_1_2_7_14_1","doi-asserted-by":"crossref","unstructured":"TsilichristouE TsolisD.A P2P cultural multimedia network \u2010 maximizing cultural dissemination and supporting copyright protection and management. in5th International Conference on Information Intelligence Systems and Applications(IISA 2014) Chania 2014;406\u2010411.","DOI":"10.1109\/IISA.2014.6878790"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2051255"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2320712"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513030"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2007.014354"},{"key":"e_1_2_7_21_1","doi-asserted-by":"crossref","unstructured":"DuX RozenblitM ShaymanM.Implementation and performance analysis of SNMP on a TLS\/TCP base. inProc. of the Seventh IFIP\/IEEE International Symposium on Integrated Network Management (IM 2001) Seattle WA 2001;453\u2010466.","DOI":"10.1109\/INM.2001.918059"},{"key":"e_1_2_7_22_1","doi-asserted-by":"crossref","unstructured":"AbdullahE FujitaS.Colluder detection in commercial P2P CDNs using reputation information. in2012 Seventh International Conference on P2P Parallel Grid Cloud and Internet Computing Victoria BC 2012;183\u2010190.","DOI":"10.1109\/3PGCIC.2012.19"},{"key":"e_1_2_7_23_1","doi-asserted-by":"crossref","unstructured":"LouXS HwangK ZhouRF.Integrated copyright protection in peer\u2010to\u2010peer networks. inProc. ICDCSW'07 2007","DOI":"10.1109\/ICDCSW.2007.40"},{"key":"e_1_2_7_24_1","doi-asserted-by":"crossref","unstructured":"DengYuQ DuMH LiangYL LiaoB.An algorithm designing for a DRM system based on P2P. inProc. WiCom'08 2008","DOI":"10.1109\/WiCom.2008.1123"},{"key":"e_1_2_7_25_1","doi-asserted-by":"crossref","unstructured":"WuWC ChenYM.TLMS: a novel DRM scheme for multimedia sharing in P2P networks. inProc. 5th IIH\u2010MSP Kyoto Japan 2009;873\u2010876.","DOI":"10.1109\/IIH-MSP.2009.176"},{"key":"e_1_2_7_26_1","doi-asserted-by":"crossref","unstructured":"MaL LiuSX WangYb.A DRM model based on proactive secret sharing scheme for P2P networks. inProc. IEEE ICCI 2010 Beijing China 2010;859\u2010862.","DOI":"10.1109\/COGINF.2010.5599791"},{"key":"e_1_2_7_27_1","doi-asserted-by":"crossref","unstructured":"IwataT AbeT UedaK SunagaH.A DRM system suitable for P2P content delivery and the study on its implementation. inProc. APCC 2003 Penang Malaysia 2003;806\u2010811.","DOI":"10.1109\/APCC.2003.1274471"},{"key":"e_1_2_7_28_1","doi-asserted-by":"crossref","unstructured":"QureshiA Rifa\u2010PousH MegiasD.State\u2010of\u2010the\u2010art challenges and open issues in integrating security and privacy in P2P content distribution systems. in2016 Eleventh International Conference on Digital Information Management (ICDIM) Porto 2016;1\u20109.","DOI":"10.1109\/ICDIM.2016.7829784"},{"key":"e_1_2_7_29_1","article-title":"A public key cryptosystem and signature scheme based on the discrete logarithm","volume":"4","author":"Gamal TE","year":"1985","journal-title":"IEEE Trans Inf Theory"},{"key":"e_1_2_7_30_1","volume-title":"Cryptography Theory and Practice","author":"Stinson DR","year":"2005"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.3476","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.3476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T18:11:05Z","timestamp":1751220665000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.3476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,8]]},"references-count":29,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2018,11,10]]}},"alternative-id":["10.1002\/dac.3476"],"URL":"https:\/\/doi.org\/10.1002\/dac.3476","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,8]]},"article-number":"e3476"}}