Cascading Payment Content Exchange (CasPaCE) Framework for P2P Networks Gurleen Arora Supervisors: Dr. M. Hanneghan & Prof. M. Merabti Networked Appliances.

Slides:



Advertisements
Similar presentations
FairPeers: Efficient Profit Sharing in Fair Peer-to-Peer Market Places
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
© 2004 Mobile VCE 3G © 2004 Mobile VCE 3G th October 2004 Regional Blackouts: Protection of Broadcast.
E-commerce Chapter 9 pp E-Commerce Buyer 1. Search & Identification 3. Purchasing 2. Selection & Negotiation 4. Product & Service Delivery 5.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 Digital Rights Management using RFID in an E-Commerce Environment World Applied Sciences Journal,5 (3), pp , 2008 Asso Hamzehei Department of.
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
Chapter9 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Sanzaru Capability-Based Interactions for Web Applications Raluca Sauciuc Shaunak Chatterjee University of California, Berkeley Motivation Limitations.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Muban Chombueng Ratjabhat University King Mongkut's University of Technology North Bangkok Nawin Kongrugsa Assoc. Prof. Dr. Prachaynun Nilsook Asst. Prof.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student.
AmbiLearn: an ambient intelligent multimodal learning environment for children Jennifer Hyndman Supervisors: Dr. Tom Lunney, Prof. Paul Mc Kevitt Intelligent.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Thesis Report Chapter 1 (Introduction)
Geoff Payne ARROW Project Manager 1 April Genesis Monash University information management perspective Desire to integrate initiatives such as electronic.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
ICT business statistics and ICT sector: Uzbekistan’s experience Prepared by Mukhsina Khusanova.
XBRL Financial Reporting Supply Chain Architecture Maciej Piechocki XBRL Project Manager.
Pushing the Security Boundaries of Ubiquitous Computing ACSF 2006 —————— 13 th July 2006 —————— David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith.
Analysis and Detection of Access Violations in Componentised Systems David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith Advances in Computer Security.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
Network Appliance Service Utilisation Framework (NASUF) Mr Paul Fergus, Dr Martin Hanneghan, Prof. Madjid Merabti Networked Appliances Laboratory School.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Purchase decision-making research based on online transaction credit risk evaluation by zhao kunpeng xjtu 28/8.
University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY License4Grid: Adopting DRM for Licensed.
UN CEFACT Single Window Recommendation Simplifying International Trade Gordon Cragge Chair – International Trade Procedures Working Group (TBG 15 of UN.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Copyright Frost & Sullivan Mobile Digital Rights Management: Managing Rights, Managing Revenues Interactive Analyst Briefing Allison Webb 12 March 2003.
Trust Propagation using Cellular Automata for UbiComp 28 th May 2004 —————— Dr. David Llewellyn-Jones, Prof. Madjid Merabti, Dr. Qi Shi, Dr. Bob Askwith.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Digital Rights Management (DRM) in the Mobile Environment T Research Seminar on Telecommunications Business Yrjö Raivio.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Study on network safety strategy against DDoS attack 林昀欣 2010 IEEE International Conference on Advanced Management Science (ICAMS) Xiaoming Bi,
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol.
Decentralized authorization and data security in web content delivery * Danfeng Yao (Brown University, USA) Yunhua Koglin (Purdue University, USA) Elisa.
Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Our Place in the Cloud DCIA P2P & Cloud Market Conference March 9, 2010.
Real time Stock quotes by web Service and Securing XML for Web Services security. Bismita Srichandan
The Contractual Regime of PayPal and Electronic Payments Irene Kull ETAg funding, project 9301.
Building Distributed Educational Applications using P2P
Peer-to-peer networking
An Overview of MPEG-21 Cory McKay.
Overview of Electronic Commerce
E-commerce Chapter 9 pp
Distributed Ledger Technology (DLT) and Blockchain
Micro-Blog - CS546 - Anoop Nimkar
INSPIRE-based e-reporting pilots
MUMT611: Music Information Acquisition, Preservation, and Retrieval
Cryptography and Network Security
Cryptocurrency and Blockchain Technology
Presentation transcript:

Cascading Payment Content Exchange (CasPaCE) Framework for P2P Networks Gurleen Arora Supervisors: Dr. M. Hanneghan & Prof. M. Merabti Networked Appliances Laboratory School of Computing and Mathematical Sciences Liverpool John Moores University Byrom Street, Liverpool L3 3AF, UK. {G.Arora, M.B. Hanneghan, M.Merabti Annual Researcher’s Conference, March 2004

Presentation Overview Motivation Issues Findings & Solution Thesis Outline Conclusion Questions

Peer Motivation: Commercial Digital Content Distribution

Peer Motivation: Commercial Digital Content Distribution

Peer Motivation: Commercial Digital Content Distribution

Issues Free-riding –Fragmentation Makes network inefficient Copyright Infringement Participation Incentives Trust between participants Atomicity in transactions Fair exchange

Findings Cascading Payments Model (CPM) –the process whereby payment flows towards the content owner through intermediary peers in a P2P network D 1. Content X3. Content X6. Content X 4. Payment 27. Payment 3 8. Fraction(Payment 3) 5. Fraction(Payment 2) 2. Payment 1 C BA Content Owner Author (A) always receives a major chunk of the payment as he holds the intellectual rights to the content. Other peers receive commissions for their participation in the economic chain, or as intermediaries/brokers like in the real world.

Findings A C B GF E D H I J Peer All peers (A-J) have equal functional capabilities i.e. they can act as normal peers as well as bank peers, barring in cases where the physical capabilities of the peer does not allow it. An Overlay Network of Peers O1 acts as a Bank for the whole system.This provides a trust mechanism for the Cascading Payment Scheme. Peers that get chosen to act as banks need to be selected randomly to deter malicious behaviour Overlay Network of Bank Peers

CasPaCE Services Framework

CasPaCE Services Payment Service Components –Payment Separator –Payment Distributor –Payment Verifier –Payment Manager Bank Service Components –Record Replicator –Transaction Manager –Overlay Manager Security Service Components – Encryption – Identification Content Exchange Service –Content Store Manager –Content Exchange Manager

Service Usage Services Payment Bank Delivery Lookup Services Delivery Lookup Services Payment Delivery Lookup Transaction Details Content Payment Thin Peer Bank Peer

Thesis Outline Abstract 1. Introduction –1.1 The Motivation –1.2 Scope, Aims and Objectives of this project –1.3 Novel Aspects of This work –1.4 Summary –1.5 Thesis Structure 2. Background and Related Work –2.1 Peer-to-Peer (P2P) – past and present –2.2 P2P Application Areas Content Sharing Collaborative computing and communications Presence management Instant Messaging Distributed Computing (resource sharing) – Hardware resource sharing Multimedia Streaming P2P frameworks and initiatives (JXTA and.NET)

Thesis Outline –2.3 Overlay Networks –2.4 Copyright Infringement & DRM Definition of digital content –2.5 Payment Methodologies Macro and Micro Payments Electronic Cash Licensing schemes Current payment methodologies in P2P –2.6 Web Services Extensible Markup Language (XML) –2.7 Security and Trust –2.8 Summary

Thesis Outline 3. The CasPaCE Framework & its components –3.1 The Framework requirements –3.1 The Cascading Payments Model (CPM) –3.2 The Overlay Network of Bank Peers –3.3 The CasPaCE Framework –3.4 CasPaCE Services and Service Usage –3.5 Summary 4. Framework Design –4.1 CPM design –4.2 CasPaCE Services and Protocols –4.3 Summary 5. System Implementation –5.1 CPM implementation –5.2 Bank Peer Overlay network implementation –5.3 CasPaCE Service Interaction –5.4 Summary

Thesis Outline 6. System evaluation and case studies –6.1 Case Study A: E-learning content exchange (ElConE) –6.2 Case Study B: Paid Service utilisation –6.3 System Evaluation –6.4 Summary 7. Conclusions and further work –7.1 Thesis Summary –7.2 Framework Enhancement –7.3 Concluding remarks References Appendices

Conclusions P2P networks are here to stay and P2P is a viable model for content distribution. P2P networks are flawed with free-riding and copyright violation which inhibits the efficient working of the P2P network. To overcome these flaws, participation incentives are required which also discourage copyright infringement. Cascading Payments is a solution to benefit all participants and to overcome these flaws.

Conclusions Monetary transactions have to be trusted and atomic so neither participant may deny the successful completion of a transaction. The CasPaCE Services Framework enables the implementation of the CPM and ensures the atomicity of transactions. This Framework can be used in different scenarios, such as –Distribution of e-learning material within an educational institution. –To pay for content and resource usage in a Networked Appliance scenario.

Publications G. Arora, M. Hanneghan, and M. Merabti, "CasPaCE: A framework for cascading payments in peer-to-peer digital content exchange," In Proceedings of the 4th Annual PostGraduate Networking Conference (PGNet 2003), Liverpool, UK, 2003, pp G. Arora, M. Hanneghan, and M. Merabti, "P2P Commercial Digital Content Exchange," Submitted to Elsevier's Journal on Electronic Commerce Research and Applications, G. Arora, M. Hanneghan, and M. Merabti, "Payment Separation and Distribution for Cascading Payments in P2P Networks," Submitted to Globecom 2004, Dallas, USA, 2004.

Questions Thank You