SPIES Secret Protection Incentive-based Escrow System N. Boris Margolin, Matthew Wright, Brian Neil Levine University of Massachusetts at Amherst.

Slides:



Advertisements
Similar presentations
Developing the Digital Market October 23, 2006 Mitch Singer EVP Technology and New Media Sony Pictures Entertainment.
Advertisements

Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Digital Rights Management © Knowledge Books & Software, 2012.
Digital Rights Management: The Technology behind the Hype Mark Stamp Department of Computer Science San Jose State University.
ACCESS 2003 November 11, 2003 Spencer Gusick VP Intellectual Property Counsel Universal Studios If you build it, they will come… Delivery of Content to.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Digital Rights Management © Knowledge Books & Software, 2012.
An Introduction to Internet Piracy Adapted from Internet Piracy Exposed by Guy Hart-Davis.
The Anti-Piracy Campaign: The Drag Behind Their Efforts Jamal Haskin.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Chapter 20 Copyright and Privacy. Copyright versus Privacy Author has interesting insight into the combination of these The new model is to purchase product.
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
The Gov't Should Filter P2P Music Movies Software.
The MediaSnap ® Digital Rights Management System Priti Sabadra and Mark Stamp Department of Computer Science San Jose State University.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Intellectual Property
Internet Piracy and its Effects on Business By Eric Kutcher.
1 Intellectual Property Includes the results of intellectual activities in the arts, sciences, and industry Includes the results of intellectual activities.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Intellectual Property Rights and Online File Sharing Erwin Solis Antoine Herve Matt Olsen Nikolai Hart Tim Scott.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
The Legal Framework Can you work out which slide each bullet point should go on?!
Intellectual Property
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Full electronic participation in society Issues: Lack of technology for everyone Not allowing/accounting for accommodations that students need Properly.
Cost Shifting Nicholas Weaver Bulk Data P2P: Cost Shifting, not Cost Savings Nicholas Weaver All opinions are my own Not of my employer or funding institutions.
Intellectual Property Software Piracy. Copying of software in large quantities for resale Illegal copying by businesses and individuals for their own.
Unethical use of Computers and Networks
A Gift of Fire, 2edChapter 6: Intellectual Property1 Intellectual Property.
A Non-Monetary Protocol for P2P Content Distribution in Wireless Broadcast Networks with Network Coding I-Hong Hou, Yao Liu, and Alex Sprintson Dept. of.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Web 2.0: Making the Web Work for You, Illustrated Unit B: Finding Media for Projects.
Watermarking. Watermarking is vital for the security of the movie but if the wrong airline name is used it can cause damage to the airline’s reputation.
Economic incentives for protecting digital rights online Source: Authors: Reporter: Date: Electronic Commerce Research and Applications, Vol.10, Issue.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Advanced Secure Technologies Secure Document Technologies.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
Evaluating New Copy-Prevention Techniques For Audio CDs John A. Halderman 2002 ACM Workshop on Digital Rights Management (DRM 2002) Available at
J. S. PATIL.  The revolution in internet and technology has made the future much more uncertain than most people assume it to be.  People can make money.
Copyright & Creative Commons Year 3 class. Overview A video on copyright and creative commons What is copyright? How to avoid copyright Why this matters.
1Malaysia Respect each other. Never infringe other people’s intellectual property (IP) Respect each other. Never infringe other people’s intellectual.
TM Click to edit Master subtitle style Lessons from Napster Copy Protection Technical Working Group Mickey W. Mantle – COO/SVP Development
Using Social Factors in Digital Rights Management 차병래.
Copyright Laws How to Get Permission? By: Ruth Garza EDTC
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Earn money by sharing files on P2P networks
Chapter 5 Network Security Protocols in Practice Part I
Technology Management Activities and Tools
Copyright Jeopardy Music Theory 2009.
Social, Legal, and Ethical Issues for Computing Technology
A Gift of Fire Third edition Sara Baase
By: Justin, Juan, Jian, and Jazlin
Five Unethical Uses of Computers
By Jake Schmitt, Seth Raleigh, Neil McLain
Digital Rights Management (DRM)
Intellectual Property Rights
Licensing, Copyrights, Piracy, and Pilferage: The protection and theft of products By: Thomas O’Rourke.
Secure Electronic Transactions (SET)
Fun Stuff: Digital Media
Presentation transcript:

SPIES Secret Protection Incentive-based Escrow System N. Boris Margolin, Matthew Wright, Brian Neil Levine University of Massachusetts at Amherst

File Sharing = Piracy P2P’s killer app: free stuff –Music, movies, software, books The Problem: –How do we prevent digital content from appearing on P2P file sharing networks? [Byers, Cranor, Cronin, Kormann, McDaniel (ACM DRM‘03)]: 77% of movies on the Internet from before release date.

The Ebert Example Roger Ebert is given a review copy of a new movie on DVD. –He has no incentive not to share the copy. Current Approaches –Enforcement: RIAA: lots of money and lawyers required Watermarking: limited soln; arms race –Prevention: DRM: proprietary solns, screen captures, etc

Our Approach We propose the use of incentives: –Escrowed money provides an economic incentive to not share the data. –Personal copies are okay; losing a copy is not –Agnostic to media protected

What SPIES is For Protection of content that should remain secret: –Sharing between small number of peers –Limited duration of protection Another layer of defense supplementing watermarking or DRM.

The SPIES Protocol 1. Exchange 2. Registration 3. Payment Protection period

1. Exchange E (Escrow) $K Alice (Owner) C (Content) Bob (Authorized Participant)

2. Registration E (Escrow) H(C) U1 U2 Alice Bob  = 4 $2K

3. Payment E (Escrow) Alice U1 U2 $2K/  f(  ) $K $UMass Alumni Fund$ Bob

Incentives and Rational Actions Alice and Bob –Sharing leads to getting less money –More sharing is worse Pirates –Get a copy and register, if possible –Don’t share it

Details Payout function Proof of content Setting amount in escrow Charities

Payment Function Problem: –Suppose Alice registers R times Solution: –Payout per registration drops s.t. R x (new payout) < 1 x (old payout) –Payout: –If f(  ) is exponential, more registrations is worse! $2K  f(  )

Proof of Content Problem: –Bob sells a modified copy of C on the side Solution: –Hash: commit to having the content during the protection period –Full content comparison Amount of Escrow

Charity Selection Problem: –Alice is a UMass Alumnus Partial Solution: –A set of charities –Choose one at random

Conclusions SPIES provides incentives to stop sharing Encourages protection of data