天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

面向版權(quán)分析的P2P協(xié)同行為研究

發(fā)布時(shí)間:2019-05-23 00:39
【摘要】:作為網(wǎng)絡(luò)資源共享的典型代表,P2P(Peer-to-Peer)技術(shù)成為資源共享的最主要方式,用戶通過P2P技術(shù)共享音樂、電影、文檔和游戲等。P2P網(wǎng)絡(luò)中的盜版泛濫嚴(yán)重?fù)p害了數(shù)字媒體公司的利益。其中,“串通盜版”(即花錢購買資源的P2P客戶端免費(fèi)分享資源給其他用戶)背后的協(xié)同行為成為P2P版權(quán)的主要威脅源,學(xué)術(shù)界和工業(yè)界對(duì)這種威脅給予了關(guān)注。 研究P2P的版權(quán)問題可以歸結(jié)為如下兩種方式:第一種方式利用協(xié)議級(jí)簽名的方法來自動(dòng)識(shí)別和有害預(yù)防;第二種方式屬于應(yīng)用級(jí)監(jiān)管,需找出非法內(nèi)容和IP之間的關(guān)系進(jìn)行非實(shí)時(shí)的針對(duì)用戶的警告或處罰。值得注意的是,第一種方式是嵌入特定個(gè)人授權(quán)協(xié)議(例如PAP)到標(biāo)準(zhǔn)的P2P協(xié)議中,,而第二種方式在旨在不影響或不改變公認(rèn)開放共享特性的標(biāo)準(zhǔn)P2P協(xié)議。事實(shí)上,在工業(yè)化實(shí)施過程中,第二種方式更實(shí)用也更容易被各方接受。本論文研究工作屬于第二種方式的范疇,基于CBF(Count BloomFilter)對(duì)協(xié)同行為分析開展了針對(duì)性研究,其創(chuàng)新與特色主要包括以下內(nèi)容: 1.提出了一種MCBFC(Multi-Count-BloomFilter-Cycle)結(jié)構(gòu)存儲(chǔ)P2P用戶行為following關(guān)系,其中MCBFC是由時(shí)間標(biāo)簽和N個(gè)CBF組成的環(huán)狀結(jié)構(gòu),每個(gè)CBF中的計(jì)數(shù)器Count都連接有一個(gè)鏈表,用戶行為following關(guān)系(U seri, R k, User j)經(jīng)哈希函數(shù)散列到相應(yīng)的鏈表中存儲(chǔ); 2.提出了一種針對(duì)協(xié)同行為的基于內(nèi)容反饋的following分析方法。論文提出了PFCF(Probabilistic Following with Content Feedback)模型,并分析了PFCF模型部署位置,對(duì)PFCF模型中的MCBFC存儲(chǔ)結(jié)構(gòu),提出了一種用戶行為關(guān)聯(lián)挖掘算法,算法通過檢測到的資源和用戶,挖掘用戶的相關(guān)行為,同時(shí)根據(jù)挖掘出來的用戶關(guān)聯(lián)行為數(shù)據(jù)進(jìn)行following概率分析以及基于內(nèi)容反饋的following概率分析,通過用戶行為following分析預(yù)防阻止P2P版權(quán); 3.基于CBF和MCBFC兩種存儲(chǔ)結(jié)構(gòu)做了充分實(shí)驗(yàn)。主要從碰撞率、空間分配、時(shí)間復(fù)雜度三個(gè)方面進(jìn)行對(duì)比,驗(yàn)證了MCBFC結(jié)構(gòu)不僅比CBF結(jié)構(gòu)好的存儲(chǔ)效率,通過犧牲可容忍計(jì)算代價(jià)有效支撐歷史行為關(guān)系分析,而且MCBFC環(huán)存儲(chǔ)結(jié)構(gòu)可以保存一定時(shí)間的用戶行為歷史數(shù)據(jù)用于分析。
[Abstract]:As a typical representative of network resource sharing, P2P (Peer-to-Peer) technology has become the most important way of resource sharing. Users share music and movies through P2P technology. Documents and games. The proliferation of piracy in P2P networks has seriously damaged the interests of digital media companies. Among them, the collaborative behavior behind "collusion piracy" (that is, P2P clients who spend money to share resources with other users for free) has become the main source of P2P copyright threat, which has been paid attention to by academia and industry. The copyright problem of P2P can be summed up in the following two ways: the first way is to use the protocol level signature method to automatically identify and prevent harm; The second method belongs to application-level supervision, and it is necessary to find out the relationship between illegal content and IP to warn or punish users in non-real time. It is worth noting that the first way is to embed specific personal authorization protocols (such as PAP) into standard P2P protocols, while the second is in standard P2P protocols that do not affect or change recognized open sharing characteristics. In fact, in the process of industrialization, the second way is more practical and easier to accept. The research work of this paper belongs to the category of the second way. Based on CBF (Count BloomFilter), the research on collaborative behavior analysis is carried out. Its innovation and characteristics mainly include the following contents: 1. In this paper, a MCBFC (Multi-Count-BloomFilter-Cycle) structure is proposed to store P2P user behavior following relationship, in which MCBFC is a ring structure composed of time label and N CBF, and the counter Count in each CBF is connected with a linked list. The user behavior following relation (U seri, R k, User j) is hashed into the corresponding linked list by hash function. 2. A content feedback based following analysis method for collaborative behavior is proposed. In this paper, the PFCF (Probabilistic Following with Content Feedback) model is proposed, and the deployment location of PFCF model is analyzed. For the MCBFC storage structure in PFCF model, a user behavior association mining algorithm is proposed. Mining the related behavior of users, at the same time, according to the excavated user association behavior data, following probability analysis and following probability analysis based on content feedback are carried out, and the P2P copyright is prevented by user behavior following analysis. 3. Full experiments are carried out based on CBF and MCBFC storage structures. This paper mainly compares the collision rate, space allocation and time complexity, and verifies that the MCBFC structure is not only better than the CBF structure in storage efficiency, but also effectively supports the historical behavior relationship analysis by sacrificing the tolerable calculation cost. Moreover, the MCBFC ring storage structure can hold the historical data of user behavior for a certain period of time for analysis.
【學(xué)位授予單位】:北京工業(yè)大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.092

【相似文獻(xiàn)】

相關(guān)期刊論文 前10條

1 馮磊;查亞兵;胡記文;尹全軍;;CGF中的協(xié)同行為建模技術(shù)[J];系統(tǒng)仿真學(xué)報(bào);2013年04期

2 ;[J];;年期

3 ;[J];;年期

4 ;[J];;年期

5 ;[J];;年期

6 ;[J];;年期

7 ;[J];;年期

8 ;[J];;年期

9 ;[J];;年期

10 ;[J];;年期

相關(guān)重要報(bào)紙文章 前7條

1 劉繼峰;協(xié)同行為該如何禁止(上)[N];中國工商報(bào);2011年

2 吳麗娜 于建強(qiáng) 林聲波 張曉 葉亮 梁斌;論我國《反壟斷法》中“其他協(xié)同行為”的認(rèn)定與查處(上)[N];中國工商報(bào);2011年

3 吳麗娜 于建強(qiáng) 林聲波 張曉葉 亮梁斌;論我國《反壟斷法》中“其他協(xié)同行為”的認(rèn)定與查處(下)[N];中國工商報(bào);2011年

4 劉繼峰;協(xié)同行為該如何禁止(下)[N];中國工商報(bào);2011年

5 全國工商系統(tǒng)第二期反壟斷與反不正當(dāng)競爭專家型人才培訓(xùn)班第二課題組;行業(yè)協(xié)會(huì)壟斷行為執(zhí)法研究[N];中國工商報(bào);2012年

6 黃勇;從傾銷到壟斷的思考[N];中國貿(mào)易報(bào);2006年

7 中國政法大學(xué)副教授 劉繼峰;俄羅斯如何規(guī)制卡特爾[N];法制日?qǐng)?bào);2009年

相關(guān)博士學(xué)位論文 前1條

1 吳道友;組織變革多階段協(xié)同行為策略及其影響機(jī)制研究:國際創(chuàng)業(yè)的視角[D];浙江大學(xué);2009年

相關(guān)碩士學(xué)位論文 前5條

1 李磊;論協(xié)同行為的認(rèn)定標(biāo)準(zhǔn)[D];上海交通大學(xué);2012年

2 張金燕;我國反壟斷法上協(xié)同行為的認(rèn)定[D];安徽大學(xué);2013年

3 劉天政;協(xié)同行為的反壟斷法認(rèn)定研究[D];北京交通大學(xué);2012年

4 周丹;價(jià)格卡特爾中協(xié)同行為的認(rèn)定與反壟斷法規(guī)制[D];西南財(cái)經(jīng)大學(xué);2012年

5 管洋洋;面向版權(quán)分析的P2P協(xié)同行為研究[D];北京工業(yè)大學(xué);2014年



本文編號(hào):2483432

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2483432.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶71281***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com