Pl-to-PI: A solution towards secure peer to peer communication network

File sharing is a corner stone application of network computing. The most popular way to achieve an efficient file sharing through the Internet is to use Peer-to-Peer (P2P) protocols via applications such as BitTorrent. However, BitTorrent is an open file sharing service that allows files to be shar...

Full description

Saved in:
Bibliographic Details
Published in2017 Sensors Networks Smart and Emerging Technologies (SENSET) pp. 1 - 4
Main Authors Ghareeb, Majd, Rammal, Marwa, Nahle, Ali, Raad, Mohamad, Bazzi, Ali
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2017
Subjects
Online AccessGet full text

Cover

Loading…
Abstract File sharing is a corner stone application of network computing. The most popular way to achieve an efficient file sharing through the Internet is to use Peer-to-Peer (P2P) protocols via applications such as BitTorrent. However, BitTorrent is an open file sharing service that allows files to be shared widely without the consent, or control, of the original publisher of the work. Such a fact is undesirable for a lot of organizations and institutions since it raises copyright and content ownership issues. In this paper we propose an efficient BitTorrent-like protocol that aims at privatizing the P2P network such that control over the distribution of copyrighted material can be achieved. This is done by limiting the user set to those authorized based on their machines MAC addresses and by using dedicated equipment, i.e. the Raspberry PI board.
AbstractList File sharing is a corner stone application of network computing. The most popular way to achieve an efficient file sharing through the Internet is to use Peer-to-Peer (P2P) protocols via applications such as BitTorrent. However, BitTorrent is an open file sharing service that allows files to be shared widely without the consent, or control, of the original publisher of the work. Such a fact is undesirable for a lot of organizations and institutions since it raises copyright and content ownership issues. In this paper we propose an efficient BitTorrent-like protocol that aims at privatizing the P2P network such that control over the distribution of copyrighted material can be achieved. This is done by limiting the user set to those authorized based on their machines MAC addresses and by using dedicated equipment, i.e. the Raspberry PI board.
Author Ghareeb, Majd
Nahle, Ali
Raad, Mohamad
Rammal, Marwa
Bazzi, Ali
Author_xml – sequence: 1
  givenname: Majd
  surname: Ghareeb
  fullname: Ghareeb, Majd
  email: majd.ghareeb@b-iu.edu.lb
  organization: Comput. & Commun. Eng., Int. Univ. of Beirut, Beirut, Lebanon
– sequence: 2
  givenname: Marwa
  surname: Rammal
  fullname: Rammal, Marwa
  organization: Comput. & Commun. Eng., Int. Univ. of Beirut, Beirut, Lebanon
– sequence: 3
  givenname: Ali
  surname: Nahle
  fullname: Nahle, Ali
  organization: Comput. & Commun. Eng., Int. Univ. of Beirut, Beirut, Lebanon
– sequence: 4
  givenname: Mohamad
  surname: Raad
  fullname: Raad, Mohamad
  organization: Comput. & Commun. Eng., Int. Univ. of Beirut, Beirut, Lebanon
– sequence: 5
  givenname: Ali
  surname: Bazzi
  fullname: Bazzi, Ali
  organization: Comput. & Commun. Eng., Int. Univ. of Beirut, Beirut, Lebanon
BookMark eNp9js0KgkAURieoRT8-gZt5Ae1eY1LbRSi1CUH3MtgNJJ2RmRHp7Ytq3erAd77FWbG50ooY8xFCREi3ZXYtsyqMAOMwwUiAgBnz0jhBASnsAVEsWV50gdNBcTnwI7e6G12rFXd6kuZmuaVmNMQHIvPevmx034-qbeTnqchN2jw2bHGXnSXvxzXz86w6nYOWiOrBtL00z_pXsftvX63FOkg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/SENSET.2017.8125050
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEL
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781509060115
1509060111
EndPage 4
ExternalDocumentID 8125050
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-ieee_primary_81250503
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:34 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-ieee_primary_81250503
ParticipantIDs ieee_primary_8125050
PublicationCentury 2000
PublicationDate 2017-Sept.
PublicationDateYYYYMMDD 2017-09-01
PublicationDate_xml – month: 09
  year: 2017
  text: 2017-Sept.
PublicationDecade 2010
PublicationTitle 2017 Sensors Networks Smart and Emerging Technologies (SENSET)
PublicationTitleAbbrev SENSET
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
Score 3.3579178
Snippet File sharing is a corner stone application of network computing. The most popular way to achieve an efficient file sharing through the Internet is to use...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Authentication
BitTorrent
Organizations
P2P
Peer-to-peer computing
Protocols
Raspberry PI
Secure file sharing
Servers
Title Pl-to-PI: A solution towards secure peer to peer communication network
URI https://ieeexplore.ieee.org/document/8125050
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQsbA0MTNIMQfmb6M0U10TEyNgOZhilqKbkmSSZGKYZJFokgpe5etn5hFq4hVhGsHEoAPfC5OamgpefJaqB2KC5_JT8pNLQUNl-sDKCFhhAzvozBYGRpC9WtCDhAwNLPWDXf2CXUNAq7XM9aAqUa5MAdcYbgIMvjC7IAtFsvVKS5L0kqvQjmEk1jGCDKKIvXkKAfBaR4iBKTVPhMEtIEe3JF83wNNKwVEBlpoUSsBLYosVikFj6qkKBampRUAxCJ2MvDFEIQ-yGFyUQdrNNcTZQxfkjvgCyEEU8VAnGIsxsOTl56VKMCgAG0xGFkmpxsBsm2aSZJZiaWxmnpwM6qRYpJkkmxlLMohgM0EKu7A0AxcoNCFLqmQYWEqKSlNlgXVwSZIcOPAB8w-MRQ
link.rule.ids 310,311,786,790,795,796,802,27956,55107
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQsbA0MTNIMQfmb6M0U10TEyNgOZhilqKbkmSSZGKYZJFokgpe5etn5hFq4hVhGsHEoAPfC5OamgpefJaqB2KC5_JT8pNLQUNl-sDKCFhhAzvorMB63sAcslsLepSQoYGlfrCrX7BrCGi9lrkeVC3KpSngOsNNgMEXZhtkqUi2XmlJkl5yFdpBjMQ6R5BBFLE7TyEAXu8IMTCl5okwuAXk6Jbk6wZ4Wik4KsDSk0IJeFFssUIxaFQ9VaEgNbUIKAahk5G3hijkQZaDizJIu7mGOHvogtwRXwA5iiIe6gRjMQaWvPy8VAkGBWCTycgiKdUYmHHTTJLMUiyNzcyTk0HdFIs0k2QzY0kGEWwmSGEXlmfg9Ajx9Yn38fTzlmbgAoUsZIGVDANLSVFpqiywRi5JkgNHBACFmo-Z
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+Sensors+Networks+Smart+and+Emerging+Technologies+%28SENSET%29&rft.atitle=Pl-to-PI%3A+A+solution+towards+secure+peer+to+peer+communication+network&rft.au=Ghareeb%2C+Majd&rft.au=Rammal%2C+Marwa&rft.au=Nahle%2C+Ali&rft.au=Raad%2C+Mohamad&rft.date=2017-09-01&rft.pub=IEEE&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FSENSET.2017.8125050&rft.externalDocID=8125050