skip to main content
10.1145/1186595.1186606acmotherconferencesArticle/Chapter ViewAbstractPublication PageswebmediaConference Proceedingsconference-collections
Article

Prototyping a novel platform for free-trade of digital content

Published:19 November 2006Publication History

ABSTRACT

The widespread use of mobile, personal computing devices, together with recent advances in wireless communication technologies, pose a myriad of new opportunities for leveraging the commerce of digital goods. We envision a novel platform for the free-trade of digital content where users are allowed to market and resell copies of digital content to others in their wireless vicinity. By keeping significant part of the revenues, users are likely to drive the sales for their and copyright holders' economic benefit. While the marketing, commitment and, optionally, downloading of content are peer-to-peer, the act of finalizing a transaction, i.e., updating users' accounts, is based on a client-server architecture. Transactions among users can be performed off-line, without the immediate assistance of the copyright holder or any central entity, with their integrity being enforced via a cryptographic protocol. Combined with the use of tamper-resistant hardware, the system delivers a simple digital rights management policy, relying on incentive-based mechanisms to build and sustain the economy. In this paper, we focus on demonstrating the technical feasibility of our ideas. We discuss typical use case scenarios and present a GUI mockup with the interaction steps needed for using most of the system's functionality. We describe the cryptographic protocol used to ensure the integrity of transactions and anticipate exceptional cases that may arise from user misbehaviour, showing how they are handled within our platform. Finally, we address the main features of the system from an implementation standpoint.

References

  1. E. Adar and B. Huberman. Free riding on Gnutella. First Monday, Vol.5, no.10, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  2. R. Anderson and M. Kuhn. Tamper resistance - A cautionary note. Usenix Workshop on Electronic Commerce, pp.1--11, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Apple iTunes. On-line at: http://www.apple.com/itunes.Google ScholarGoogle Scholar
  4. au LISTEN MOBILE SERVICE. On-line at: http://www.kddi.com/lismo.Google ScholarGoogle Scholar
  5. Axalto Inc. On-line at: http://www.axalto.com/index.asp.Google ScholarGoogle Scholar
  6. BigChampagne. P2P Usage Volumes. On-line at: http://www.bigchampagne.com.Google ScholarGoogle Scholar
  7. Bluetooth SIG. On-line at: http://www.bluetooth.com/bluetooth.Google ScholarGoogle Scholar
  8. C. Buragohain, D. Agrawal, and S. Suri. A game theoretic framework for incentives in P2P systems. International Conference on Peer-to-Peer Computing, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. Cohen. Incentives Build Robustness in BitTorrent. Workshop on Economics of Peer-to-Peer Systems, 2003.Google ScholarGoogle Scholar
  10. CoreMedia AG. Viral marketing with superdistribution. On-line at: http://www.coremedia.com/en/88908/superdistribution.Google ScholarGoogle Scholar
  11. T. Dierksa and C. Allen. The TLS Protocol Version 1.0. Internet draft, 1999. On-line at: http://ietf.org/rfc/rfc2246.txt. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Fanning and S. Parker. Napster. June, 1999.Google ScholarGoogle Scholar
  13. Federal Information Processing Standards. Security Requirements for Cryptographic Modules. Publication FIPS PUB 140--2, 2002.Google ScholarGoogle Scholar
  14. Federal Information Processing Standards. Specifications for the secure hash standard. Publication FIPS 180--2. 2002.Google ScholarGoogle Scholar
  15. M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust Incentive Techniques for Peer-to-Peer Networks. ACM Electronic Commerce, pp.102--11, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. O. Freier, P. Karlton, and P. C. Kocher. The SSL Protocol Version 3.0. Internet draft, 1996. On-line at: http://www.netscape.com/eng/ss13/draft302.txt.Google ScholarGoogle Scholar
  17. Gemplus Inc. On-line at: http://www.gemplus.com/smart/rd/publications.Google ScholarGoogle Scholar
  18. P. Golle, K. Leyton-Brown, I. Mironov, and M. Lillibridge. Incentives for sharing in peer-to-peer networks. ACM Electronic Commerce, pp.75--87, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Hristova, G. O'Hare. Ad-me: wireless advertising adapted to the user location, device and emotions. Proceedings of the 37th annual Hawaii international conference on system sciences (HICSS'04), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. IEEE 802.15 WPAN Task Group 3 (TG3). On-line at: http://www.ieee802.org/15/pub/TG3.html.Google ScholarGoogle Scholar
  21. IFPI. IFPI:06 Digital Music Report. On-line at: http://www.ifpi.org/site-content/library/digital-music-report-2006.pdf.Google ScholarGoogle Scholar
  22. Infineon Technologies AG. On-line at: http://www.infineon.com.Google ScholarGoogle Scholar
  23. JSR-000082 Java#8482; APIs for Bluetooth (Final Release). On-line at: http://jcp.org/aboutJava/communityprocess/final/jsr082.Google ScholarGoogle Scholar
  24. S. Jurvetson. What exactly is viral marketing? Red Herring, Vol.78, pp.110--112, 2000.Google ScholarGoogle Scholar
  25. D. Kirovski and K. Jain. Off-line Economies for Digital Media. ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. Kurkovsky, K. Harihar. Using ubiquitous computing in interactive mobile marketing. Personal Ubiquitous Comput. Vol.10, no.4, pp. 227--240, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. LTDnetwork, Inc. QTrax. On-line at: http://www.qtrax.com/.Google ScholarGoogle Scholar
  28. Mashboxx. On-line at: http://www.mashboxx.com.Google ScholarGoogle Scholar
  29. Microsoft Windows DRM. On-line at: http://www.microsoft.com/windows/windowsmedia/drm.Google ScholarGoogle Scholar
  30. nCipher Technologies Inc. On-line at: http://www.ncipher.com/technologies.Google ScholarGoogle Scholar
  31. G. R. Newman and R. V. Clarke. Superhighway Robbery: Preventing e-commerce crime. Willan Publishing, 2003. On-line at: http://www.eurim.org.uk/activities/ecrime/scale.doc.Google ScholarGoogle Scholar
  32. NIST. Secure hash standard. Federal Information Processing Standard, FIPS-180-1, April 1995.Google ScholarGoogle Scholar
  33. T.-W. Ngan, D. Wallach, and P. Druschel. Enforcing Fair Sharing of Peer-to-Peer Resources. International Workshop on Peer-to-Peer Systems, 2003.Google ScholarGoogle Scholar
  34. J. Paynter and P. Law. An arm's length evaluation of Octopus. University Of Auckland, Department of Management Science and Information Systems, working paper, 2005.Google ScholarGoogle Scholar
  35. O. Ratsimor, T. Finin, A. Joshi, Y. Yesha. eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments. Proceedings of the 5th international conference on electronic commerce (ICEC'03), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. R. L. Rivest, A. Shamir, and L. A. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Vol.21, no.2, pp.120--126, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. SafeNet Inc. On-line at: http://www.safenet-inc.com/products/tokens/products_sc_330.asp.Google ScholarGoogle Scholar
  38. U.S. Copyright Office. The digital millennium copyright act of 1998. Summary, December 1998.Google ScholarGoogle Scholar
  39. Weedshare Inc. On-line at: http://www. weedshare. com.Google ScholarGoogle Scholar
  40. Windows Embedded Source Tools for Bluetooth Technology. On-line at: http://msdn.microsoft.com/embedded/usewinemb/ce/sharedsrccode/west/.Google ScholarGoogle Scholar
  41. Wurld Media, Inc. PeerImpact. On-line at: http://www.peerimpact.com.Google ScholarGoogle Scholar
  42. B. Yu, C. Li, M. P. Singh, and K. Sycara. A Dynamic Pricing Mechanism for P2P Referral Systems. International Joint Conference on Autonomous Agents and Multi-Agent Systems, pp.1426--27, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Prototyping a novel platform for free-trade of digital content

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        WebMedia '06: Proceedings of the 12th Brazilian Symposium on Multimedia and the web
        November 2006
        328 pages
        ISBN:8576691000
        DOI:10.1145/1186595

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 November 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate270of873submissions,31%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader