Skip to main content

Evaluation of Object-Based Information Flow Control in P2PPS Systems

  • Conference paper
  • First Online:
  • 1114 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 25))

Abstract

In the P2PPSO (P2P (peer-to-peer) type of topic-based PS (publish/subscribe) with object concept) model, each peer process (peer) exchanges objects by publishing and subscribing event messages which are characterized by topics with no centralized coordinator. Information in a peer \(p_i\) illegally flows to a peer \(p_j\) if an event message \(e_i\) published by the peer \(p_i\) carries an object on some topics into the target peer \(p_j\), which is not allowed to subscribe the topics. In our previous studies, a TOBS (topics of objects-based synchronization) protocol is proposed to prevent illegal information flow in the P2PPSO system. In the TOBS protocol, an illegal object whose topics a target peer is not allowed to subscribe is not delivered to the target peer. In this paper, we evaluate the TOBS protocol in terms of the number of event messages including at least one illegal object. In the evaluation, we show the number of event messages including illegal objects in the TOBS protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Google Alert. http://www.google.com/alerts

  2. Blanco, R., Alencar, P.: Event models in distributed event based systems. In: Principles and Applications of Distributed Event-Based Systems, pp. 19–42 (2010)

    Google Scholar 

  3. Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Reading (1982)

    Google Scholar 

  4. Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. ACM Comput. Surv. 35(2), 114–131 (2003)

    Article  Google Scholar 

  5. Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Controls, 2nd edn. Artech, Norwood (2007)

    MATH  Google Scholar 

  6. Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int. J. Space Based Situated Comput. 6(1), 43–53 (2016)

    Article  Google Scholar 

  7. Nakamura, S., Enokido, T., Takizawa, M.: A flexible read-write abortion protocol with role safety concept to prevent illegal information flow. J. Ambient. Intell. Hum.Ized Comput. (accepted). https://doi.org/10.1007/s12652-017-0541-1

    Article  Google Scholar 

  8. Nakamura, S., Enokido, T., Takizawa, M.: Object-based information flow control model in P2PPS systems. In: Proceedings of the 21st International Conference on Network-Based Information Systems (NBiS-2018) (2018, accepted)

    Google Scholar 

  9. Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: An information flow control model in a topic-based publish/subscribe system. J. High Speed Netw. 24(3), 243–257 (2018)

    Article  Google Scholar 

  10. Nakayama, H., Duolikun, D., Enokido, T., Takizawa, M.: Reduction of unnecessarily ordered event messages in peer-to-peer model of topic-based publish/subscribe systems. In: Proceedings of IEEE the 30th International Conference on Advanced Information Networking and Applications (AINA-2016), pp. 1160–1167 (2016)

    Google Scholar 

  11. Setty, V., van Steen, M., Vitenberg, R., Voulgaris, S.: PolderCast: fast, robust, and scalable architecture for P2P topic-based pub/sub. In: Proceedings of ACM/IFIP/USENIX 13th International Conference on Middleware (Middleware 2012), pp. 271–291 (2012)

    Google Scholar 

  12. Tarkoma, S.: Publish/Subscribe System: Design and Principles, 1st edn. Wiley, Hoboken, (2012)

    Book  Google Scholar 

  13. Waluyo, A.B., Taniar, D., Rahayu, W., Aikebaier, A., Takizawa, M., Srinivasan, B.: Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments. J. Comput. Syst. Sci. (JCSS) 78(6), 1716–1736 (2012)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was supported by Japan Society for the Promotion of Science (JSPS) KAKENHI Grant Numbers JP15H0295, JP17J00106.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shigenari Nakamura .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nakamura, S., Enokido, T., Takizawa, M. (2019). Evaluation of Object-Based Information Flow Control in P2PPS Systems. In: Barolli, L., Leu, FY., Enokido, T., Chen, HC. (eds) Advances on Broadband and Wireless Computing, Communication and Applications. BWCCA 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-030-02613-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02613-4_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02612-7

  • Online ISBN: 978-3-030-02613-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics