Pl-to-PI: A solution towards secure peer to peer communication network
File sharing is a corner stone application of network computing. The most popular way to achieve an efficient file sharing through the Internet is to use Peer-to-Peer (P2P) protocols via applications such as BitTorrent. However, BitTorrent is an open file sharing service that allows files to be shar...
Saved in:
Published in | 2017 Sensors Networks Smart and Emerging Technologies (SENSET) pp. 1 - 4 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.09.2017
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | File sharing is a corner stone application of network computing. The most popular way to achieve an efficient file sharing through the Internet is to use Peer-to-Peer (P2P) protocols via applications such as BitTorrent. However, BitTorrent is an open file sharing service that allows files to be shared widely without the consent, or control, of the original publisher of the work. Such a fact is undesirable for a lot of organizations and institutions since it raises copyright and content ownership issues. In this paper we propose an efficient BitTorrent-like protocol that aims at privatizing the P2P network such that control over the distribution of copyrighted material can be achieved. This is done by limiting the user set to those authorized based on their machines MAC addresses and by using dedicated equipment, i.e. the Raspberry PI board. |
---|---|
AbstractList | File sharing is a corner stone application of network computing. The most popular way to achieve an efficient file sharing through the Internet is to use Peer-to-Peer (P2P) protocols via applications such as BitTorrent. However, BitTorrent is an open file sharing service that allows files to be shared widely without the consent, or control, of the original publisher of the work. Such a fact is undesirable for a lot of organizations and institutions since it raises copyright and content ownership issues. In this paper we propose an efficient BitTorrent-like protocol that aims at privatizing the P2P network such that control over the distribution of copyrighted material can be achieved. This is done by limiting the user set to those authorized based on their machines MAC addresses and by using dedicated equipment, i.e. the Raspberry PI board. |
Author | Ghareeb, Majd Nahle, Ali Raad, Mohamad Rammal, Marwa Bazzi, Ali |
Author_xml | – sequence: 1 givenname: Majd surname: Ghareeb fullname: Ghareeb, Majd email: majd.ghareeb@b-iu.edu.lb organization: Comput. & Commun. Eng., Int. Univ. of Beirut, Beirut, Lebanon – sequence: 2 givenname: Marwa surname: Rammal fullname: Rammal, Marwa organization: Comput. & Commun. Eng., Int. Univ. of Beirut, Beirut, Lebanon – sequence: 3 givenname: Ali surname: Nahle fullname: Nahle, Ali organization: Comput. & Commun. Eng., Int. Univ. of Beirut, Beirut, Lebanon – sequence: 4 givenname: Mohamad surname: Raad fullname: Raad, Mohamad organization: Comput. & Commun. Eng., Int. Univ. of Beirut, Beirut, Lebanon – sequence: 5 givenname: Ali surname: Bazzi fullname: Bazzi, Ali organization: Comput. & Commun. Eng., Int. Univ. of Beirut, Beirut, Lebanon |
BookMark | eNp9js0KgkAURieoRT8-gZt5Ae1eY1LbRSi1CUH3MtgNJJ2RmRHp7Ytq3erAd77FWbG50ooY8xFCREi3ZXYtsyqMAOMwwUiAgBnz0jhBASnsAVEsWV50gdNBcTnwI7e6G12rFXd6kuZmuaVmNMQHIvPevmx034-qbeTnqchN2jw2bHGXnSXvxzXz86w6nYOWiOrBtL00z_pXsftvX63FOkg |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/SENSET.2017.8125050 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEL url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781509060115 1509060111 |
EndPage | 4 |
ExternalDocumentID | 8125050 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-ieee_primary_81250503 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:37:34 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-ieee_primary_81250503 |
ParticipantIDs | ieee_primary_8125050 |
PublicationCentury | 2000 |
PublicationDate | 2017-Sept. |
PublicationDateYYYYMMDD | 2017-09-01 |
PublicationDate_xml | – month: 09 year: 2017 text: 2017-Sept. |
PublicationDecade | 2010 |
PublicationTitle | 2017 Sensors Networks Smart and Emerging Technologies (SENSET) |
PublicationTitleAbbrev | SENSET |
PublicationYear | 2017 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 3.3579178 |
Snippet | File sharing is a corner stone application of network computing. The most popular way to achieve an efficient file sharing through the Internet is to use... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Authentication BitTorrent Organizations P2P Peer-to-peer computing Protocols Raspberry PI Secure file sharing Servers |
Title | Pl-to-PI: A solution towards secure peer to peer communication network |
URI | https://ieeexplore.ieee.org/document/8125050 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQsbA0MTNIMQfmb6M0U10TEyNgOZhilqKbkmSSZGKYZJFokgpe5etn5hFq4hVhGsHEoAPfC5OamgpefJaqB2KC5_JT8pNLQUNl-sDKCFhhAzvozBYGRpC9WtCDhAwNLPWDXf2CXUNAq7XM9aAqUa5MAdcYbgIMvjC7IAtFsvVKS5L0kqvQjmEk1jGCDKKIvXkKAfBaR4iBKTVPhMEtIEe3JF83wNNKwVEBlpoUSsBLYosVikFj6qkKBampRUAxCJ2MvDFEIQ-yGFyUQdrNNcTZQxfkjvgCyEEU8VAnGIsxsOTl56VKMCgAG0xGFkmpxsBsm2aSZJZiaWxmnpwM6qRYpJkkmxlLMohgM0EKu7A0AxcoNCFLqmQYWEqKSlNlgXVwSZIcOPAB8w-MRQ |
link.rule.ids | 310,311,786,790,795,796,802,27956,55107 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQsbA0MTNIMQfmb6M0U10TEyNgOZhilqKbkmSSZGKYZJFokgpe5etn5hFq4hVhGsHEoAPfC5OamgpefJaqB2KC5_JT8pNLQUNl-sDKCFhhAzvorMB63sAcslsLepSQoYGlfrCrX7BrCGi9lrkeVC3KpSngOsNNgMEXZhtkqUi2XmlJkl5yFdpBjMQ6R5BBFLE7TyEAXu8IMTCl5okwuAXk6Jbk6wZ4Wik4KsDSk0IJeFFssUIxaFQ9VaEgNbUIKAahk5G3hijkQZaDizJIu7mGOHvogtwRXwA5iiIe6gRjMQaWvPy8VAkGBWCTycgiKdUYmHHTTJLMUiyNzcyTk0HdFIs0k2QzY0kGEWwmSGEXlmfg9Ajx9Yn38fTzlmbgAoUsZIGVDANLSVFpqiywRi5JkgNHBACFmo-Z |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+Sensors+Networks+Smart+and+Emerging+Technologies+%28SENSET%29&rft.atitle=Pl-to-PI%3A+A+solution+towards+secure+peer+to+peer+communication+network&rft.au=Ghareeb%2C+Majd&rft.au=Rammal%2C+Marwa&rft.au=Nahle%2C+Ali&rft.au=Raad%2C+Mohamad&rft.date=2017-09-01&rft.pub=IEEE&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FSENSET.2017.8125050&rft.externalDocID=8125050 |