ABSTRACT
The widespread use of mobile, personal computing devices, together with recent advances in wireless communication technologies, pose a myriad of new opportunities for leveraging the commerce of digital goods. We envision a novel platform for the free-trade of digital content where users are allowed to market and resell copies of digital content to others in their wireless vicinity. By keeping significant part of the revenues, users are likely to drive the sales for their and copyright holders' economic benefit. While the marketing, commitment and, optionally, downloading of content are peer-to-peer, the act of finalizing a transaction, i.e., updating users' accounts, is based on a client-server architecture. Transactions among users can be performed off-line, without the immediate assistance of the copyright holder or any central entity, with their integrity being enforced via a cryptographic protocol. Combined with the use of tamper-resistant hardware, the system delivers a simple digital rights management policy, relying on incentive-based mechanisms to build and sustain the economy. In this paper, we focus on demonstrating the technical feasibility of our ideas. We discuss typical use case scenarios and present a GUI mockup with the interaction steps needed for using most of the system's functionality. We describe the cryptographic protocol used to ensure the integrity of transactions and anticipate exceptional cases that may arise from user misbehaviour, showing how they are handled within our platform. Finally, we address the main features of the system from an implementation standpoint.
- E. Adar and B. Huberman. Free riding on Gnutella. First Monday, Vol.5, no.10, 2000.Google ScholarCross Ref
- R. Anderson and M. Kuhn. Tamper resistance - A cautionary note. Usenix Workshop on Electronic Commerce, pp.1--11, 1996. Google ScholarDigital Library
- Apple iTunes. On-line at: http://www.apple.com/itunes.Google Scholar
- au LISTEN MOBILE SERVICE. On-line at: http://www.kddi.com/lismo.Google Scholar
- Axalto Inc. On-line at: http://www.axalto.com/index.asp.Google Scholar
- BigChampagne. P2P Usage Volumes. On-line at: http://www.bigchampagne.com.Google Scholar
- Bluetooth SIG. On-line at: http://www.bluetooth.com/bluetooth.Google Scholar
- C. Buragohain, D. Agrawal, and S. Suri. A game theoretic framework for incentives in P2P systems. International Conference on Peer-to-Peer Computing, 2003. Google ScholarDigital Library
- B. Cohen. Incentives Build Robustness in BitTorrent. Workshop on Economics of Peer-to-Peer Systems, 2003.Google Scholar
- CoreMedia AG. Viral marketing with superdistribution. On-line at: http://www.coremedia.com/en/88908/superdistribution.Google Scholar
- T. Dierksa and C. Allen. The TLS Protocol Version 1.0. Internet draft, 1999. On-line at: http://ietf.org/rfc/rfc2246.txt. Google ScholarDigital Library
- S. Fanning and S. Parker. Napster. June, 1999.Google Scholar
- Federal Information Processing Standards. Security Requirements for Cryptographic Modules. Publication FIPS PUB 140--2, 2002.Google Scholar
- Federal Information Processing Standards. Specifications for the secure hash standard. Publication FIPS 180--2. 2002.Google Scholar
- M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust Incentive Techniques for Peer-to-Peer Networks. ACM Electronic Commerce, pp.102--11, 2004. Google ScholarDigital Library
- A. O. Freier, P. Karlton, and P. C. Kocher. The SSL Protocol Version 3.0. Internet draft, 1996. On-line at: http://www.netscape.com/eng/ss13/draft302.txt.Google Scholar
- Gemplus Inc. On-line at: http://www.gemplus.com/smart/rd/publications.Google Scholar
- P. Golle, K. Leyton-Brown, I. Mironov, and M. Lillibridge. Incentives for sharing in peer-to-peer networks. ACM Electronic Commerce, pp.75--87, 2001. Google ScholarDigital Library
- N. Hristova, G. O'Hare. Ad-me: wireless advertising adapted to the user location, device and emotions. Proceedings of the 37th annual Hawaii international conference on system sciences (HICSS'04), 2004. Google ScholarDigital Library
- IEEE 802.15 WPAN Task Group 3 (TG3). On-line at: http://www.ieee802.org/15/pub/TG3.html.Google Scholar
- IFPI. IFPI:06 Digital Music Report. On-line at: http://www.ifpi.org/site-content/library/digital-music-report-2006.pdf.Google Scholar
- Infineon Technologies AG. On-line at: http://www.infineon.com.Google Scholar
- JSR-000082 Java#8482; APIs for Bluetooth (Final Release). On-line at: http://jcp.org/aboutJava/communityprocess/final/jsr082.Google Scholar
- S. Jurvetson. What exactly is viral marketing? Red Herring, Vol.78, pp.110--112, 2000.Google Scholar
- D. Kirovski and K. Jain. Off-line Economies for Digital Media. ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video, 2006. Google ScholarDigital Library
- S. Kurkovsky, K. Harihar. Using ubiquitous computing in interactive mobile marketing. Personal Ubiquitous Comput. Vol.10, no.4, pp. 227--240, 2006. Google ScholarDigital Library
- LTDnetwork, Inc. QTrax. On-line at: http://www.qtrax.com/.Google Scholar
- Mashboxx. On-line at: http://www.mashboxx.com.Google Scholar
- Microsoft Windows DRM. On-line at: http://www.microsoft.com/windows/windowsmedia/drm.Google Scholar
- nCipher Technologies Inc. On-line at: http://www.ncipher.com/technologies.Google Scholar
- G. R. Newman and R. V. Clarke. Superhighway Robbery: Preventing e-commerce crime. Willan Publishing, 2003. On-line at: http://www.eurim.org.uk/activities/ecrime/scale.doc.Google Scholar
- NIST. Secure hash standard. Federal Information Processing Standard, FIPS-180-1, April 1995.Google Scholar
- T.-W. Ngan, D. Wallach, and P. Druschel. Enforcing Fair Sharing of Peer-to-Peer Resources. International Workshop on Peer-to-Peer Systems, 2003.Google Scholar
- J. Paynter and P. Law. An arm's length evaluation of Octopus. University Of Auckland, Department of Management Science and Information Systems, working paper, 2005.Google Scholar
- O. Ratsimor, T. Finin, A. Joshi, Y. Yesha. eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments. Proceedings of the 5th international conference on electronic commerce (ICEC'03), 2003. Google ScholarDigital Library
- R. L. Rivest, A. Shamir, and L. A. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Vol.21, no.2, pp.120--126, 1978. Google ScholarDigital Library
- SafeNet Inc. On-line at: http://www.safenet-inc.com/products/tokens/products_sc_330.asp.Google Scholar
- U.S. Copyright Office. The digital millennium copyright act of 1998. Summary, December 1998.Google Scholar
- Weedshare Inc. On-line at: http://www. weedshare. com.Google Scholar
- Windows Embedded Source Tools for Bluetooth Technology. On-line at: http://msdn.microsoft.com/embedded/usewinemb/ce/sharedsrccode/west/.Google Scholar
- Wurld Media, Inc. PeerImpact. On-line at: http://www.peerimpact.com.Google Scholar
- B. Yu, C. Li, M. P. Singh, and K. Sycara. A Dynamic Pricing Mechanism for P2P Referral Systems. International Joint Conference on Autonomous Agents and Multi-Agent Systems, pp.1426--27, 2004. Google ScholarDigital Library
Index Terms
- Prototyping a novel platform for free-trade of digital content
Recommendations
eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments
ICEC '03: Proceedings of the 5th international conference on Electronic commerceIn recent years, the growth of Mobile Computing, Electronic Commerce and Mobile Electronic Commerce has created a new concept of Mobile Electronic Marketing. New marketing models are being developed and used to target mobile users. Mobile environments ...
Research Note---The Impact of External Word-of-Mouth Sources on Retailer Sales of High-Involvement Products
Online word-of-mouth (WOM) such as consumer opinions, user experiences, and product reviews has become a major information source in consumer purchase decisions. Prior research on online WOM effect has focused mostly on low-involvement products such as ...
Fee or Free: When Should Firms Charge for Online Content?
Many online content providers aim to compensate for a loss in advertising revenues by charging consumers for access to content. However, such a choice is not straightforward because subscription fees typically deter customers, and a resulting decline in ...
Comments