30 research outputs found

    Class Based Multi Stage Encryption for Efficient Data Security in Cloud Environment Using Profile Data

    Get PDF
    The security issues in the cloud have been well studied. The data security has much importance in point of data owner. There are number of approaches presented earlier towards performance in data security in cloud. To overcome the issues, a class based multi stage encryption algorithm is presented in this paper. The method classifies the data into number of classes and different encryption scheme is used for different classes in different levels. Similarly, the user has been authenticated for their access and they have been classified into different categories. According to the user profile, the method restricts the access of user and based on the same, the method defines security measures. A system defined encryption methodology is used for encrypting the data. Moreover, the user has been returned with other encryption methods which can be decrypted by the user using their own key provided by the system. The proposed algorithm improves the performance of security and improves the data security

    A survey on security, privacy and anonymity in legal distribution of copyrighted multimedia content over peer-to-peer networks

    Full text link

    Tracking Traitors in Web Services via Blind Signatures

    Get PDF
    This paper presents a method and its implementation, built on the blind signatures protocol, to trace users sharing their licenses illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization. An enhancement of the protocol to identify the last usage of a certain license is also provided, allowing to detect a traitor when an unauthorized copy of a license is used

    P2P and the Future of Private Copying

    Get PDF
    Since the beginning of the P2P file-sharing controversy, commentators have discussed the radical expansion of copyright law, the industry\u27s controversial enforcement tactics, the need for new legislative and business models, the changing social norms, and the evolving interplay of politics and market conditions. Although these discussions have delved into the many aspects of the controversy, none of them presents a big picture of the issues or explains how they fit within the larger file-sharing debate. Using a holistic approach, this Article brings together existing scholarship while offering some thoughts on the future of private copying. The Article does not seek to advance a new theory or model, which could quickly become obsolete, given the rapid advance of digital and P2P technologies. Rather, it provides guidelines to help policymakers to craft an effective solution to the unauthorized copying problem. This Article begins by examining the RIAA\u27s enforcement tactics, developments in copyright law in 2003, and possible challenges the entertainment industry will face in ensuing years. The Article then evaluates critically proposals commentators have put forward to solve the unauthorized copying problem: (1) mass licensing, (2) compulsory licensing, (3) voluntary collective licensing, (4) voluntary contribution, (5) technological protection, (6) copyright law revision, (7) administrative dispute resolution proceeding, and (8) alternative compensation. Acknowledging the provisional nature of these proposals, this Article contends that policymakers need to adopt a range of solutions that meet the needs of consumers while taking into account the Internet\u27s structural resistance to control, its immutable characteristics as a network, and the changing social norms in the digital copyright world. This Article concludes by challenging policymakers and commentators to step outside their mental boundaries to rethink the P2P file-sharing debate. By presenting thought experiments that compare the ongoing P2P file-sharing wars to (1) a battle for self-preservation between humans and machines, (2) an imaginary World War III, and (3) the conquest of Generation Y, this Article demonstrates that policymakers should not focus on legal solutions alone. Instead, they should pay more attention to market forces, technological architectures, and social norms, which also play very important roles in crafting an effective solution to the unauthorized copying problem. The Article concludes by offering some guidelines that may point the way to this solution

    Content Control: The Motion Picture Association of America's Patrolling of Internet Piracy in America, 1996-2008

    Get PDF
    This historical and political economic investigation aims to illustrate the ways in which the Motion Picture Association of America radically revised their methods of patrolling and fighting film piracy from 1996-2008. Overall, entertainment companies discovered the World Wide Web to be a powerful distribution outlet for cultural works, but were suspicious that the Internet was a Wild West frontier requiring regulation. The entertainment industry's guiding belief in regulation and strong protection were prompted by convictions that once the copyright industries lose control, companies quickly submerge like floundering ships. Guided by fears regarding film piracy, the MPAA instituted a sophisticated and seemingly impenetrable "trusted system" to secure its cultural products online by crafting relationships and interlinking the technological, legal, institutional, and rhetorical in order to carefully direct consumer activity according to particular agendas. The system created a scenario in which legislators and courts of law consented to play a supportive role with privately organized arrangements professing to serve the public interest, but the arrangements were not designed for those ends. Additionally, as cultural products became digitized consumers experienced a paradigm shift that challenged the concept of property altogether. In the digital world the Internet gives a consumer access to, rather than ownership of, cultural products in cyberspace. The technology granting consumers, on impulse, access to enormous amounts of music and films has been called, among many things, the "celestial jukebox." Regardless of what the technology is called, behind the eloquent veneer is the case in point of a systematic corrosion of consumer rights that, in the end, results in an unfair exchange between the content producers and consumers. What is the relationship of the MPAA to current piracy practices in America? How will Hollywood's enormous economic investment in content control affect future film distribution, exhibition, and consumer reception? Through historical analysis regarding the MPAA's campaign against film piracy along with interviews from key media industry personnel and the pirate underground, this contemporary illustration depicts how the MPAA secures its content for Internet distribution, and defines and criticizes the legal and technological controls that collide with consumer freedoms

    Digital Copyright and Confuzzling Rhetoric

    Get PDF
    The entertainment industry tells people they shouldn’t steal music because they wouldn’t steal a car, but has anybody ever downloaded a car? Music fans praise Napster and other file-sharing services for helping to free artists from the stranglehold of the music industry, but how many of these services actually have shared profits with songwriters and performing artists? Industry representatives claim that people use YouTube primarily to listen to or watch copyrighted contents, but are they missing a big piece of the user-generated content picture? Artists are encouraged to forget about copyright and hold live concerts instead, but can all artists succeed under this alternative compensation model? For more than a decade, policymakers, industry representatives, consumer advocates, civil libertarians, academic commentators, and user communities have advanced a wide array of arguments for or against online file sharing and restrictive copyright standards. This article begins by introducing two short stories to illustrate the rhetorical and analytical challenges in the digital copyright debate. It then examines eight unpersuasive arguments advanced by both sides of the debate - four from the industry and four from its opponents. The article concludes by outlining six different strategies to help the industry develop more convincing proposals for digital copyright reform

    Digital Copyright and Confuzzling Rhetoric

    Get PDF
    For more than a decade, policymakers, industry representatives, consumer advocates, civil libertarians, academic commentators, and user communities have advanced a wide array of arguments for or against online file sharing and restrictive copyright standards. This Article begins by introducing two short stories to illustrate the rhetorical and analytical challenges in the digital copyright debate. It then examines eight unpersuasive arguments advanced by both sides of the debate--four from the industry and four from its opponents. The Article concludes by outlining six different strategies to help the industry develop more convincing proposals for digital copyright reform

    Digital Copyright and Confuzzling Rhetoric

    Get PDF
    The entertainment industry tells people they shouldn’t steal music because they wouldn’t steal a car, but has anybody ever downloaded a car? Music fans praise Napster and other file-sharing services for helping to free artists from the stranglehold of the music industry, but how many of these services actually have shared profits with songwriters and performing artists? Industry representatives claim that people use YouTube primarily to listen to or watch copyrighted contents, but are they missing a big piece of the user-generated content picture? Artists are encouraged to forget about copyright and hold live concerts instead, but can all artists succeed under this alternative compensation model? For more than a decade, policymakers, industry representatives, consumer advocates, civil libertarians, academic commentators, and user communities have advanced a wide array of arguments for or against online file sharing and restrictive copyright standards. This article begins by introducing two short stories to illustrate the rhetorical and analytical challenges in the digital copyright debate. It then examines eight unpersuasive arguments advanced by both sides of the debate - four from the industry and four from its opponents. The article concludes by outlining six different strategies to help the industry develop more convincing proposals for digital copyright reform
    corecore