Reference Hub2
Digital Rights Management for Untrusted Peer-to-Peer Networks

Digital Rights Management for Untrusted Peer-to-Peer Networks

Pallavi Priyadarshini, Mark Stamp
Copyright: © 2009 |Pages: 32
ISBN13: 9781605662626|ISBN10: 1605662623|EISBN13: 9781605662633
DOI: 10.4018/978-1-60566-262-6.ch006
Cite Chapter Cite Chapter

MLA

Priyadarshini, Pallavi, and Mark Stamp. "Digital Rights Management for Untrusted Peer-to-Peer Networks." Handbook of Research on Secure Multimedia Distribution, edited by Shiguo Lian and Yan Zhang, IGI Global, 2009, pp. 86-117. https://doi.org/10.4018/978-1-60566-262-6.ch006

APA

Priyadarshini, P. & Stamp, M. (2009). Digital Rights Management for Untrusted Peer-to-Peer Networks. In S. Lian & Y. Zhang (Eds.), Handbook of Research on Secure Multimedia Distribution (pp. 86-117). IGI Global. https://doi.org/10.4018/978-1-60566-262-6.ch006

Chicago

Priyadarshini, Pallavi, and Mark Stamp. "Digital Rights Management for Untrusted Peer-to-Peer Networks." In Handbook of Research on Secure Multimedia Distribution, edited by Shiguo Lian and Yan Zhang, 86-117. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-262-6.ch006

Export Reference

Mendeley
Favorite

Abstract

Peer-to-peer (P2P) networks have proliferated and become ubiquitous. A school of thought has emerged that harnessing the established user-base and ease of content dissemination of such networks presents a potentially lucrative opportunity. However, content creators have been reluctant to adopt P2P networks as a distribution vehicle since these networks are plagued with piracy. This chapter focuses on developing a solution for distributing digital content in P2P networks in a way that established businesses and amateur artists alike can profit. We propose a content distribution system that employs Digital Rights Management (DRM) technologies and is independent of the underlying P2P network. Our system relies on innovative uses of security technologies to deter piracy. In addition, we include various non-technical features that encourage users to “play by the rules”.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.