Académique Documents
Professionnel Documents
Culture Documents
Electronic media is widely replacing information broadcasting. Software and multimedia piracy is a burning problem to companies. Our paper describes various software piracy issues software licensing frameworks. We are introducing KS piracy control pyramid model for reducing piracy. This model effectively applicable to piracy control of movies, software, games, multimedia content. WWW is becoming major platform for software piracy we are proposing a model based on web mining techniques which gives a greater control on piracy. Also this model keeps an investigative eye on web usage patterns for gaining information about major piracy affected or supported sites. All the layers depend on each other for regulating piracy activities.
Keywords: web content mining, web usage mining, KS piracy control pyramid, licensing
Frameworks.
1. Introduction
Software piracy is defined as the unauthorized or unlawful usage, loading, copying, duplication or distribution of software. WWW becoming as major channel for piracy related to electronic media. Since large number of networks joined in this web it is hard to control piracy. Companies and authors of media products are facing a great challenge from piracy. A system needed to monitor web usage patterns and investigate the tracks that lead to piracy. Even though Cyber laws are capable to enforce greater regulation on piracy, pirates are using loopholes in web to do piracy activities.
100 80 60 40 20 0 Multimedia S/W Video Audio Piracy categories 2000 2002 2004 2006 2008 2010
Software piracy occurs in three forms unlicensed use, counterfeit sale and drive uploading. Unlicensed takes place when organizations or individuals make duplicate copies of original software or share more computers than its licensed agreement. Counterfeit sale is the act of illegal copying of software with the intention of selling it online or on street. Drive uploading is copying and installing unauthorized copies of software on to the disk of computer as an incentive for the buyer to purchase the machine. Media piracy is treated as copying and distributing audio/video of movies, tele films and documentaries without the permission of content authors. Generating e-books of content related to books, journals, manuals, documents of organizations, research works without authors agreement is also considered as media-piracy.
10
International Journal of Computational Intelligence and Information Security, September 2011 Vol. 2, No. 9
11
International Journal of Computational Intelligence and Information Security, September 2011 Vol. 2, No. 9
In this four layered pyramid each layer depend on other. Data dependency of layers is bottom-to-top where as control and regulation activities flow from top-to-bottom. Each layer dedicated for a significant work progressing to piracy control.
3.1.2 Layer 2
Piracy site Tracker: Purpose of piracy site tracker is to process data provided by layer-1 for tracking data about piracy supporting activities. This data is submitted to Data Mining tools. Data Mining Tool: Data Mining extracts information from data and process by applying clustering, association rule mining and generalization of attributes for generating meaningful information to next layer Clustering techniques used to group web content or web session information without knowing the characteristics of attributes Association rule mining helps to generate relationships among web sites basing on association rules defined in data mining Generalization is the process of refined hierarchical arrangement of web data provided by piracy site tracker.
3.1.3Layer 3
Defined as Rules Layer which defines several rule structures and functionalities that are used to investigate layer-2 data regarding piracy.
12
International Journal of Computational Intelligence and Information Security, September 2011 Vol. 2, No. 9
Cyber Laws: Supports cyber laws regarding to software & multimedia piracy regulation. This module verifies web usage mining patterns and web content about piracy deals. Piracy Site Crawler: Performs an investigative crawl on piracy sites and reports violations of rules to cyber laws module for further proceedings EULA Validators: End User License Agreement validator verifies software regarding their owners licensing and validity periods. Pirated downloads are identified by these validators. Piracy control acts: A set of acts that verifies web abusage regarding software and multimedia piracy. It generates reports to layer-4 for reviews by piracy controlling authorities.
3.1.4 Layer 4
Defined as Action Layer which is a controlling layer that integrated with judicial forums. Finalizes the actions to be taken on culprits who are responsible for piracy. This layer also generates guidelines and specifications to lower layers for analyzing data in each layer. Supports controlling and coordination among pyramid layers. Two major modules in this layer are judicial actions panel, software & multimedia piracy regulation authority. Judicial Actions Panel (JAP): A panel of judicial authorities organized as web forums. JAP performs discussions on new approval of acts to meet the challenges of software and multimedia piracy. Provides concrete rules for software copyrights. Takes necessary actions on pirated sites. Also restricts web usage for piracy of multimedia through controlling and monitoring all pyramid layer activities. Software and Multimedia Piracy Regulation Authority (SMPRA): all the companies who produce software registered to JAP through this module in this layer. JAP handovers the piracy controlling process for organizations products. SMPRA deals with various legal issues regarding multimedia (movies, albums, videos, short films, visual aids, music and technical shows) piracy. The authority investigates the reports generated by lower layers of Piracy control pyramid and generates regulating activities in collaboration with JAP.
4. Conclusion
Media piracy is a haunting problem faced by MNCs and organizations. We proposed pyramidal model to regulate as well as control piracy with concrete framework. Still so much research needed to overcome new challenges arises day to day. A strong collaboration among judicial authorities and investigative framework needed to curb piracy. This KS-Model can be applicable to any protocol that supports anti-piracy activities. The features of web mining and data mining utilized widely in this model to clustering, association rule mining and classification among piracy related web session information. Emerging trends in data mining field increases efficiency of this model.
References
[1] Bechtold, S. From Copyright to Information Law Implications of Digital Rights Management. Retrieved Jun 2002 from http://www.starlab.com/sander/spdrm/papers.html. [2] Borland, J. (May 2001). "Spyware" piggybacks on Napster rivals. Retrieved Jun 2002 from http://news.com.com/2100-1023-257592.html. [3] Budd, T. (August 2001). Protecting and Managing Electronic Content with a Digital Battery. IEEE Computer. [4] Chang, H. & Atallah, M. (2001). Protecting Software Code by Guards. RetrievedApr 2002 from http://www.star-lab.com/sander/spdrm/papers.html. [5] Copyright infringements and piracy (2009) Thomas Lee Davies from http://www.copynot.com
B.Sushma Working as Assistant Professor in department of Information Technology of Vardhaman Engineering College. She is pursuing M.Tech from JNTUH and her areas of interests includes information security, data mining, Artificial Intelligence
B.V.RamaKrishna Working as Assoc.Prof. in CSE dept. of Vardhaman Engineering College. His areas of interest are data mining, network security, e-commerce. He currently pursuing Ph.D. from Acharya Nagarjuna University, India
13