skip to main content
10.1145/1921168.1921183acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Is content publishing in BitTorrent altruistic or profit-driven?

Published:30 November 2010Publication History

ABSTRACT

BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity of BitTorrent is primarily due to the availability of valuable content without any cost for the consumers. However, apart from required resources, publishing (sharing) valuable (and often copyrighted) content has serious legal implications for users who publish the material (or publishers). This raises a question that whether (at least major) content publishers behave in an altruistic fashion or have other incentives such as financial. In this study, we identify the content publishers of more than 55K torrents in two major BitTorrent portals and examine their behavior. We demonstrate that a small fraction of publishers is responsible for 67% of the published content and 75% of the downloads. Our investigations reveal that these major publishers respond to two different profiles. On the one hand, antipiracy agencies and malicious publishers publish a large amount of fake files to protect copyrighted content and spread malware respectively. On the other hand, content publishing in BitTorrent is largely driven by companies with financial incentives. Therefore, if these companies lose their interest or are unable to publish content, BitTorrent traffic/portals may disappear or at least their associated traffic will be significantly reduced.

References

  1. http://www.theregister.co.uk/2008/06/02/onk_further_arrests/.Google ScholarGoogle Scholar
  2. http://yro.slashdot.org/yro/05/01/13/2248252.shtml?id=123&tid=97&tid=95&tid=1.Google ScholarGoogle Scholar
  3. MaxMind. http://www.maxmind.com.Google ScholarGoogle Scholar
  4. The Impact of P2P File Sharing, Voice over IP, Skype, Joost, Instant Messaging, One-Click Hosting and Media Streaming such as YouTube on the Internet, 2007. http://www.ipoque.com/resources/internet-studies/internet-study-2007.Google ScholarGoogle Scholar
  5. Bay TSP Annual Report, 2008. http://tech.mit.edu/V129/N28/piracy/BayTSP2008report.pdf.Google ScholarGoogle Scholar
  6. S. Le Blond, A. Legout, F. Lefessant, W. Dabbous, and M. Ali Kaafar. Spying the world from your laptop. LEET'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. R. Choffnes, J. Duch, D. Malmgren, R. Guimera, F. E. Bustamante, and L. Amaral. Strange bedfellows: Communities in bittorrent. IPTPS'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Cuevas, M. Kryczka, A. Cuevas, S. Kaune, C. Guerrero, and R. Rejaie. Is content publishing in bittorrent altruistic or profit-driven?. Tech report: http://arxiv.org/abs/1007.2327, 2010.Google ScholarGoogle Scholar
  9. R. Cuevas, N. Laoutaris, X. Yang, G. Siganos, and P. Rodriguez. Deep Diving into BitTorrent Locality. In ACM SIGMETRICS'10 (Poster Session). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, and X. Zhang. Measurements, Analysis, and Modeling of BitTorrent-like Systems. In ACM IMC'05. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. David Hales, Rameez Rahman, Boxun Zhang, Michel Meulpolder, and Johan Pouwelse. Bittorrent or bitcrunch: Evidence of a credit squeeze in bittorrent? In WETICE '09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Izal, G. Urvoy-Keller, E. W. Biersack, P. A. Felber, A. Al Hamra, and L. Garces-Erice. Dissecting bittorrent: Five months in a torrent's lifetime. In PAM '04.Google ScholarGoogle Scholar
  13. S. Kaune, R. Cuevas, G. Tyson, A. Mauthe, C. Guerrero, and R. Steinmetz. Unraveling BitTorrent's File Unavailability: Measurements, Analysis and Solution Exploration. In IEEE P2P'10.Google ScholarGoogle Scholar
  14. B. Krishnamurthy and C. E. Wills. On the leakage of personally identifiable information via online social networks. In ACM WOSN '09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. N. Laoutaris, D. Carra, and P. Michiardi. Uplink allocation beyond choke/unchoke or how to divide and conquer best. In ACM CoNEXT'08. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Legout, N. Liogkas, E. Kohler, and L. Zhang. Clustering and sharing incentives in bittorrent systems. In ACM SIGMETRICS '07. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Liang, N. Naoumov, and K. W. Ross. The index poisoning attack in p2p file sharing systems. In IEEE INFOCOM'06, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  18. D. Menasche, A. Rocha, B. Li, D. Towsley, and A. Venkataramani. Content availability in swarming systems: Models, measurements and bundling implications. In ACM CoNEXT'09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, and A. Venkataramani. Do incentives build robustness in BitTorrent? In NSDI'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. A. Pouwelse, P. Garbacki, D. H. J. Epema, and H. J. Sips. The BitTorrent P2P file-sharing system: Measurements and analysis. In IPTPS'05. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Sirivianos, J. Han, P. Rex, and C. X. Yang. Free-riding in bittorrent networks with the large view exploit. In IPTPS 07, 2007.Google ScholarGoogle Scholar
  22. C. Zhang, P. Dhungel, D. Wu, and K. W. Ross. Unraveling the bittorrent ecosystem. IEEE Transactions on Parallel and Distributed Systems, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Is content publishing in BitTorrent altruistic or profit-driven?

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      Co-NEXT '10: Proceedings of the 6th International COnference
      November 2010
      349 pages
      ISBN:9781450304481
      DOI:10.1145/1921168

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 November 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate198of789submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader