Peeking behind the great firewall: privacy on Chinese file sharing networks

Matthew Comb, Paul A. Watters

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

1 Citation (Scopus)

Abstract

As citizens debate the morality of using global surveillance to enforce cyber security, software technologies that can proliferate illegal distribution of copyright material are evolving rapidly. One such technology is Peer-to-Peer networking which, through well-known implementations such as Napster, Bittorrent and eMule, has enabled users to share files at optimal speeds and at near infinite scale. This technology is contentious in that it can distribute highly desired files globally in minutes if not seconds and determining illegal vs legal applications is a challenge. Recently, a new player Xunlei has arrived on the Peer-to-Peer scene with an impressive network and unprecedented global reach. Xunlei, a proprietary Peer-to-Peer network, is unique in that it aggregates multiple file sources together seamlessly enabling content to be consumed via a single client. The aggregated approach raises some ethical dilemmas. Is it a good thing that centralised management of Peer-to-Peer networks exists? Is it a form of populous control? Where will it lead as Peer-to-Peer usage becomes more mainstream? Finally, does it threaten an individual's privacy? This paper investigates the Xunlei network as it stands today and takes valuable steps towards addressing these questions, and to defining future fields of research.

Original languageEnglish
Title of host publication2016 Fourteenth Annual Conference on Privacy, Security and Trust, PST 2016
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages650-655
Number of pages6
ISBN (Electronic)9781509043798
DOIs
Publication statusPublished - 2016
Externally publishedYes
Event14th Annual Conference on Privacy, Security and Trust, PST 2016 - Auckland, New Zealand
Duration: 12 Dec 201614 Dec 2016

Conference

Conference14th Annual Conference on Privacy, Security and Trust, PST 2016
Country/TerritoryNew Zealand
CityAuckland
Period12/12/1614/12/16

Keywords

  • Decryption
  • Forensics
  • P2P

Fingerprint

Dive into the research topics of 'Peeking behind the great firewall: privacy on Chinese file sharing networks'. Together they form a unique fingerprint.

Cite this