Uma Nova Estratégia Completamente Distribuída para Combate à Poluição de Conteúdo em Transmissões ao Vivo

Roverli P. Ziwich, Glaucio P. Silveira and Elias P. Duarte Jr.
Proc. of the 31st Brazilian Symp. on Computer Networks and Distributed Systems (SBRC'2013),
Brasilia, DF, Brazil, pages 441-454, May 2013.  [pdf]  



Abstract

Live streaming transmissions are becoming increasingly frequent in the Internet. One of the main challenges of those transmissions is to detect and prevent content pollution. This work presents a novel strategy to combat content pollution in P2P-based live streaming that is fully distributed. In order to prevent the propagation of polluted content, each peer independently compares and classifies its neighbors, and stops requesting chunks from those neighbors identified as polluters. The proposed solution was implemented using Fireflies, a scalable overlay network protocol. Experimental results evaluate the impact of the proposed strategy in terms of the network bandwidth overhead, and show that the strategy is an effective solution to combat content pollution in realistic scenarios of live streaming transmissions.


Resumo

É notável o crescente uso da Internet para transmissões ao vivo. Por outro lado a poluição de conteúdo nas transmissões ao vivo em redes P2P continua sendo um desafio, já que soluções incorrem necessariamente em sobrecarga de processamento, de uso de rede, ou até atrasos na transmissão. Este trabalho apresenta uma nova estratégia distribuída e descentralizada com o objetivo de combater a propagação de conteúdo poluído em transmissões ao vivo. Para impedir a propagação da poluição, cada peer do sistema executa comparações periódicas sobre determinados chunks de seus vizinhos. Com base nos resultados das comparações, cada peer, de forma independente dos demais, deixa de solicitar chunks aos seus vizinhos considerados poluidores. A solução proposta foi implementada no Fireflies, um protocolo escalável para redes overlay. Resultados experimentais mostram que esta estratégia adiciona baixa sobrecarga no tráfego da rede, e é uma solução viável para tratar a poluição de conteúdo em transmissões ao vivo: em vários casos a solução foi capaz de eliminar a poluição no decorrer das transmissões.


References

Borges, A., Almeida, J. M., and Campos, S. V. A. (2008). Fighting Pollution in P2P Live Streaming Systems. Proc. of the IEEE Intl. Conf. on Multimedia and Expo, pages 481–484.

Borges, A., Gomes, P., Nacif, J., Mantini, R., Almeida, J. M., and Campos, S. V. A. (2012). Characterizing SopCast Client Behavior. Computer Communications, 35(8):1004–1016.

Chen, R., Lua, E. K., Crowcroft, J., Guo, W., Tang, L., and Chen, Z. (2008). Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks. Proc. of the 8th IEEE Intl. Conf. on Peer-to-Peer Computing, pages 22–29.

Christin, N., Weigend, A. S., and Chuang, J. (2005). Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks. Proc. of the 6th ACM Conf. on Electronic Commerce, pages 68–77.

Coelho, R. V., Pastro, J. T., Antunes, R. S., Barcellos, M. P., Jansch-Pôrto, I., and Gaspary, L. P. (2011). Challenging the Feasibility of Authentication Mechanisms for P2P Live Streaming. Proc. of the 6th Latin America Networking Conference, pages 55–63.

Dhungel, P., Hei, X., Ross, K. W., and Saxena, N. (2007). The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses. Proc. of the Workshop on Peer-to-peer Streaming and IP-TV, pages 323–328.

Dhungel, P., Hei, X., Ross, K. W., and Saxena, N. (2009). Pollution in P2P Live Video Streaming. Intl. Journal of Computer Networks and Communications, 1(2):99–110.

Duarte Jr., E. P., Ziwich, R. P., and Albini, L. C. P. (2011). A Survey of Comparison-Based System-Level Diagnosis. ACM Computing Surveys, 43(3):22:1–22:56.

Feng, C. and Li, B. (2008). On Large-Scale Peer-to-Peer Streaming Systems with Network Coding. Proc. of the 16th ACM Intl. Conf. on Multimedia, pages 269–278.

Gheorghe, G., Cigno, R. L., and Montresor, A. (2010). Security and Privacy Issues in P2P Streaming Systems: A Survey. Peer-to-Peer Networking and Applications, 4(2):75–91.

Haridasan, M. and van Renesse, R. (2006). Defense Against Intrusion in a Live Streaming Multicast System. Proc. of the 6th IEEE Intl. Conf. on Peer-to-Peer Computing, pages 185–192.

Johansen, H., Allavena, A., and van Renesse, R. (2006). Fire?ies: Scalable Support for IntrusionTolerant Network Overlays. Proc. of the 1st ACM SIGOPS/EuroSys European Conf. on Computer Systems, 40(4):3–13.

Li, J.-S., Hsieh, C.-J., and Wang, Y.-K. (2012). Distributed Key Management Scheme for Peer-to-Peer Live Streaming Services. Intl. Journal of Communication Systems.

Liang, J., Kumar, R., and Ross, K. W. (2006). The FastTrack Overlay: A Measurement Study. Computer Networks, 50(6):842–858.

Liang, J., Naoumov, N., and Ross, K. W. (2005). Eficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems. Proc. of the Asian Internet Engineering Conf., pages 173–175.

Lin, E., de Castro, D. M. N., Wang, M., and Aycock, J. (2010). SPoIM: A Close Look at Pollution Attacks in P2P Live Streaming. Proc. of the 18th Intl. Workshop on Quality of Service, pages 1–9.

Loocher, T., Meier, R., Schmid, S., and Wattenhofer, R. (2007). Push-to-Pull Peer-to-Peer Live Streaming. Proc. of the 21st Intl. Symp. on Distributed Computing, pages 388–402.

Maeng, J. and Malek, M. (1981). A Comparison Connection Assignment for Self-Diagnosis of Multiprocessor Systems. Proc. of the 11th IEEE Fault-Tolerant Computing Symp., pages 173–175.

Oliveira, J., Borges, A., and Campos, S. V. A. (2009). Content Pollution on P2P Live Streaming Systems. Proc. of the 15th Brazilian Symp. on Multimedia and the Web, (50).

Pai, V., Kumar, K., Tamilmani, K., Sambamurthy, V., Mohr, A. E., and Mohr, E. E. (2005). Chainsaw: Eliminating Trees from Overlay Multicast. Proc. of the 4th Intl. Workshop on Peer-To-Peer Systems, pages 127–140.

Schimidt, E. A., Ziwich, R. P., Duarte Jr., E. P., and Jansch-Pôrto, I. (2011). Diagnóstico de Poluição de Conteúdo em Redes P2P para Transmissões de Mídia Contínua ao Vivo. Proc. of the 17th Brazilian Symp. on Multimedia and the Web, pages 221–228.

Walsh, K. and Sirer, E. G. (2006). Experience with an Object Reputation System for Peer-to-Peer Filesharing. Proc. of the 3rd USENIX Symp. on Networked Systems Design and Implementation, 3:1–14.

Wang, Q., Vu, L., Nahrstedt, K., and Khurana, H. (2010). MIS: Malicious Nodes Identi?cation Scheme in Network-Coding-Based Peer-to-Peer Streaming. Proc. of the 29th IEEE Intl. Conf. on Computer Communications, pages 1–5.

Wong, C. K. and Lam, S. S. (1999). Digital Signatures for Flows and Multicasts. IEEE/ACM Trans. on Networking, 7(4):502–513.

Yang, S., Jin, H., Li, B., Liao, X., Yao, H., and Tu, X. (2008). The Content Pollution in Peer-to-Peer Live Streaming Systems: Analysis and Implications. Proc. of the 37th Intl. Conf. on Parallel Processing, pages 652–659.

Zhang, P. and Helvik, B. E. (2011). Modeling and Analysis of P2P Content Distribution under Coordinated Attack Strategies. IEEE Consumer Communications and Networking Conf., pages 131–135.

Ziwich, R. P., Duarte Jr., E. P., and Albini, L. C. P. (2005). Distributed Integrity Checking for System with Replicated Data. Proc. of the 11th IEEE Intl. Conf. on Parallel and Distributed Systems, pages 363–369.