This article is highly informative for a researcher wanting to obtain an understanding of what makes P2P works and how this system was created and has evolved over the years. There also information highlighting the major events that are likely to happen in P2P environment in the near future, both positive and negative aspects. The authors believe that copyright issues would still plague P2P while security strategies could be highly improved. Banerjee, Anirban, Faloutsos, Michalis, and Laxmi Bhuyan. The P2P war: Someone is monitoring your activities. Computer Networks 52 (2008): 1272-1280.
In order to catch and prosecute people involved in illegal content sharing, the Recording Association of America and the Motion Picture Association of America have employed fake users to trap P2P users and control the free sharing of copyrighted information over the Internet. The authors of this article conducted a large-scale experiment to test the probability of a P2P user encountering one of these fake users. The authors found out that a naive P2P user can easily run into one of these fake users and exposes himself to the potential of getting sued.
The result of this experiment is interesting since it shows a new kind of war between the P2P community and the media companies. Duchechene, Anne and Patrick Waelbroeck. The legal and technological battle in the music industry: Information-push versus information-pull technologies. International Review of Law and Economics 26 (2006): 565-580. In this article, the authors discuss about information-push and information-pull technology, each of which represents the traditional distribution of media and the P2P community.
P2P serves as the battleground between big music companies and independent artists. Record companies profitability is threatened by P2P sharing while independent and upcoming artists see the medium as a better means of promoting their records. The authors believe that granting a stronger legal copyright protection to music producers would be beneficial to them but detrimental to social welfare and small-time artists. The authors suggest that original materials should have additional features to make users prefer them over copies.
Gaspary, Luciano Paschoal, et al. Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing. Computer Networks 51 (2007):4797-4815. This article introduces the P2P Security Layer, a new software architecture to provide flexibility in integrating security mechanisms in P2P systems. Security is a major challenge facing people and businesses using peer-to-peer technology. With this new software technology, the authors believe that P2P network can expand beyond its common file sharing apability.
This article highlights the widespread use of P2P, not only among independent users, but among companies as well. In order to maximize the advantages of this system, companies have to be sure with the security mechanisms in place. The P2PSL is designed to make this technology safe from unwanted eyes. Grodzinsky, Frances S. and Herman T. Tavani. P2P networks and the Verizon v. RIAA case: Implications for personal privacy and intellectual property. Ethics and Information Technology 243 (2008).
This article examines the impact on ethics of the courts decision in the case between Inter provider Verizon and the Recording Industry Association of America. The authors relate the intellectual and privacy issues in the case to the challenges facing the peer-to-peer network. Verizon, through a court order, was obliged to release information of one of its subscribers who was accused of sharing 600 mp3s that are copyrighted. Also included in the discussion is the impact of the Digital Millennium Copyright Act to P2P.
The authors position in the Verizon v. RIAA case is on maintaining privacy and sharing of information. This article is important to understand how privacy issues are being threatened by the aggressive move of record companies in stamping out music piracy. Shieh, Shiuhpyng W. and Dan S. Wallach. Ad hoc and P2P security. IEEE Internet Computing (2005): 14-15. This article serves as an introductory outline to five P2P articles that explores the research trends in Internet technology, including network architecture security, the detection of worms and other malicious nodes in networks.
Also in this article is an examination of how ad hoc networking and P2P systems are gaining more users. With these trends, the authors highlight the increasing need to innovate and improve existing network security and defense techniques against the presence of harmful spywares and worms that could be used by malicious sources to destroy data or interfere with processes. Tang, Puay. Digital copyright and the new controversy: Is the law moulding technology and innovation? Research Policy 34 (2005): 852-871.
In this article, the author explores the impact of digital copyright laws in Europe and in the United States on Internet innovations. In particular, this article analyzes how P2P in businesses and in music retailing are affected by these IP laws. The author asserts that despite the stricter laws on copyright, innovation has not been inhibited. Instead, Internet innovators have become more creative in dodging the laws. More importantly, the traditional music producers have come to accept that they need to adapt to current trends and integrate technology in their retailing systems, as well as offering records at more affordable prices.
The media producers are even considering online delivery as a necessary method alongside the traditional ones (869). Yihe, Liu, Nianqing, Tang, and He Wenxiao. An Information Security Model Based on P2P Network. International Symposium on Electronic Commerce and Security (2008): 381-384. In this article, the authors define a P2P model for information security using trust and security grade. The classification and reputation grades are introduced through the BLP model and current access control systems.
This article is highly technical and describes in detail the necessary elements needed to create a security model for information sharing in peer-to-peer network systems. There are formulas with their explanations to serve as proof that the method the authors propose is valid and workable. There are also mathematical configurations that show how the system can be explained given that rules and properties of operation have been defined. Yu, Wei, Chellapan, et al. Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. Computer Communications (2008): 1-13.
The authors in this article study the propagation and infection of networks because of P2P networks. Two active worms are identified. One acts on offline hit-list model while the other acts on online models. Their mechanism of action and impact on P2P systems are analyzed. Once the worms are identified and analyzed, the authors propose combat systems that would prevent worms from infecting systems via the P2P network. This study is important as worms can propagate undetected in systems and networks and they could steal and destroy valuable information.
The authors believe that their work is the first in the industry and their model defense strategy could be very useful for P2P users to prevent unwanted programs from infecting their network. Zhang, Yejiang, et al. A P2P e-commerce related network security issue: P2P worm. International Symposium on Electronic Commerce and Security (2008): 114-117. This article discusses the security issues facing a P2P e-commerce network. In particular, the P2P worms affecting e-commerce sites are identified and characterized.
The purpose of properly identifying these worms is to come up with defense strategies that would prevent the leak of confidential business information. Worms are categorized as active, silent and counterfeit (115). Among these three, the active worm is the most threatening to e- commerce sites as they spread aggressively on systems. The authors strategy in detecting and eliminating worms involve a military-like method that calls for cooperation and collaboration among systems and users of P2P networks. Each network will be divided into defense segments for faster containment of any worm before it can spread to other areas.