Advertisement

A Flexible Synchronization Protocol to Learn Hidden Topics in P2PPS Systems

  • Shigenari NakamuraEmail author
  • Tomoya Enokido
  • Makoto Takizawa
Chapter
  • 152 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11610)

Abstract

We consider the P2PPS (peer-to-peer type of topic-based publish/subscribe) model where each peer process (peer) can publish and subscribe event messages with no centralized coordinator. Here, hidden topics are topics which a source peer is allowed to subscribe but a target peer is not allowed to subscribe. After receipt of an event message \(e_1\) with hidden topics, if a peer publishes another event message \(e_2\), the event message \(e_2\) may be related with the hidden topics of the event message \(e_1\). Hence, if an event message with hidden topics is received by another target peer which does not subscribe the hidden topics, the target peer can get information on the hidden topics. This means, illegal information flow to the target peer occurs. However, some hidden topics may be related with a subscription topic of a target peer and the target peer just may not know about the hidden topics. In this paper, we newly introduce a learning mechanism where each peer newly obtains hidden topics if the hidden topics are related with subscription topics. In this paper, we newly propose an FS-H (flexible synchronization for hidden topics) protocol. In the evaluation, we show the fewest number of event messages are prohibited from being received in the FS-H protocol compared with the other protocols.

Keywords

Information flow control P2P (peer-to-peer) model PS (publish/subscribe) systems TBAC (topic-based access control) model FS-H (flexible synchronization for hidden topics) protocol 

Notes

Acknowledgement

This work was supported by Japan Society for the Promotion of Science (JSPS) KAKENHI Grant Numbers JP15H0295, JP17J00106.

References

  1. 1.
    Bacon, J., Eyers, D.M., Singh, J., Pietzuch, P.R.: Access control in publish/subscribe systems. In: Proceedings of the 2nd International Conference on Distributed Event-based Systems, pp. 23–34 (2008)Google Scholar
  2. 2.
    Balakrishnan, S.M., Sangaiah, A.K.: Integrated quality of user experience and quality of service approach to service selection in internet of services. Int. J. Grid Util. Comput. 8(4), 282–298 (2017)CrossRefGoogle Scholar
  3. 3.
    Barolli, L., Xhafa, F.: A p2p platform for distributed, collaborative and ubiquitous computing. IEEE Trans. Industr. Electron. 58(6), 2063–2172 (2011)CrossRefGoogle Scholar
  4. 4.
    Blanco, R., Alencar, P.: Event models in distributed event based systems. In: Principles and Applications of Distributed Event-Based Systems, pp. 19–42 (2010)Google Scholar
  5. 5.
    Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Boston (1982)zbMATHGoogle Scholar
  6. 6.
    Enokido, T., Takizawa, M.: A purpose-based synchronization protocol for secure information flow control. Int. J. Comput. Syst. Sci. Eng. 25(2), 25–32 (2010)Google Scholar
  7. 7.
    Enokido, T., Takizawa, M.: Purpose-based information flow control for cyber engineering. IEEE Trans. Industr. Electron. 58(6), 2216–2225 (2011)CrossRefGoogle Scholar
  8. 8.
    Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. ACM Comput. Surv. 35(2), 114–131 (2003)CrossRefGoogle Scholar
  9. 9.
    Fernandez, E.B., Summers, R.C., Wood, C.: Database Security and Integrity. Addison Wesley, Boston (1980)Google Scholar
  10. 10.
    Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech, Norwood (2007)zbMATHGoogle Scholar
  11. 11.
    Google alert: http://www.google.com/alerts. Accessed 1 Aug 2018
  12. 12.
    Gueye, B., Flauzac, O., Rabat, C., Niang, I.: A self-adaptive structuring for large-scale P2P grid environment: design and simulation analysis. Int. J. Grid Util. Comput. 8(3), 254–267 (2017)CrossRefGoogle Scholar
  13. 13.
    John, P.M., Arockiasamy, S., Thangiah, P.R.J.: A personalised user preference and feature based semantic information retrieval system in semantic web search. Int. J. Grid Util. Comput. 9(3), 256–267 (2018)CrossRefGoogle Scholar
  14. 14.
    Liu, Y., Ozera, K., Matsuo, K., Barolli, L.: An intelligent approach for qualified voting in P2P mobile collaborative team: a comparison study for two fuzzy-based systems. Int. J. Space-Based Situated Comput. 7(4), 207–216 (2017)CrossRefGoogle Scholar
  15. 15.
    Liu, Z., Luo, J., Xu, L.: A fine-grained attribute-based authentication for sensitive data stored in cloud computing. Int. J. Grid Util. Comput. 7(4), 237–244 (2016)CrossRefGoogle Scholar
  16. 16.
    Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A flexible read-write abortion protocol to prevent illegal information flow among objects. J. Mob. Multimed. 11(3&4), 263–280 (2015)Google Scholar
  17. 17.
    Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A write abortion-based protocol in role-based access control systems. Int. J. Adapt. Innov. Syst. 2(2), 142–160 (2015)CrossRefGoogle Scholar
  18. 18.
    Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion (RWA) protocol to prevent illegal information flow in role-based access control systems. Int. J. Space-Based Situated Comput. 6(1), 43–53 (2016)CrossRefGoogle Scholar
  19. 19.
    Nakamura, S., Duolikun, D., Takizawa, M.: Read-abortion (RA) based synchronization protocols to prevent illegal information flow. J. Comput. Syst. Sci. 81(8), 1441–1451 (2015)MathSciNetzbMATHCrossRefGoogle Scholar
  20. 20.
    Nakamura, S., Enokido, T., Takizawa, M.: A topic-based synchronisation protocol in peer-to-peer publish/subscribe systems, accepted for publication at International Journal of Communication Networks and Distributed SystemsGoogle Scholar
  21. 21.
    Nakamura, S., Enokido, T., Takizawa, M.: Sensitivity-based synchronisation protocol to prevent illegal information flow among objects. Int. J. Web Grid Serv. 13(3), 315–333 (2017)CrossRefGoogle Scholar
  22. 22.
    Nakamura, S., Enokido, T., Takizawa, M.: A flexible read-write abortion protocol with role safety concept to prevent illegal information flow. J. Ambient. Intell. Hum. Comput. 9(5), 1415–1425 (2018)CrossRefGoogle Scholar
  23. 23.
    Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Flexible synchronization protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Barolli, L., Terzo, O. (eds.) CISIS 2017. AISC, vol. 611, pp. 82–93. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-61566-0_8CrossRefGoogle Scholar
  24. 24.
    Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: An information flow control model in a topic-based publish/subscribe system. J. High Speed Netw. 24(3), 243–257 (2018)CrossRefGoogle Scholar
  25. 25.
    Nakayama, H., Duolikun, D., Enokido, T., Takizawa, M.: Selective delivery of event messages in peer-to-peer topic-based publish/subscribe systems. In: Proceedings of the 18th International Conference on Network-Based Information Systems, pp. 379–386 (2015)Google Scholar
  26. 26.
    Nakayama, H., Duolikun, D., Enokido, T., Takizawa, M.: Reduction of unnecessarily ordered event messages in peer-to-peer model of topic-based publish/subscribe systems. In: Proceedings of IEEE the 30th International Conference on Advanced Information Networking and Applications, pp. 1160–1167 (2016)Google Scholar
  27. 27.
    Osborn, S., Sandhu, R.S., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2), 85–106 (2000)CrossRefGoogle Scholar
  28. 28.
    Sandhu, R.S.: Lattice-based access control models. IEEE Comput. 26(11), 9–19 (1993)CrossRefGoogle Scholar
  29. 29.
    Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)CrossRefGoogle Scholar
  30. 30.
    Setty, V., Steen, M.V., Vitenberg, R., Voulgaris, S.: Poldercast: fast, robust, and scalable architecture for P2P topic-based pub/sub. In: Proceedings of ACM/IFIP/USENIX 13th International Conference on Middleware, pp. 271–291 (2012)Google Scholar
  31. 31.
    Tarkoma, S.: Publish/Subscribe System: Design and Principles, 1st edn. Wiley, Hoboken (2012)CrossRefGoogle Scholar
  32. 32.
    Tomimori, M., Sugawara, S.: Content sharing method using expected acquisition rate in hybrid peer-to-peer networks with cloud storages. Int. J. Space-Based Situated Comput. 7(4), 187–196 (2017)CrossRefGoogle Scholar
  33. 33.
    Waluyo, A.B., Taniar, D., Rahayu, W., Aikebaier, A., Takizawa, M., Srinivasan, B.: Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments. J. Comput. Syst. Sci. 78(6), 1716–1736 (2012)MathSciNetzbMATHCrossRefGoogle Scholar
  34. 34.
    Yamamoto, Y., Hayashibara, N.: Merging topic groups of a publish/subscribe system in causal order. In: Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, pp. 172–177 (2017)Google Scholar
  35. 35.
    Yoichi, R., Sugawara, S.: Consistency preservation of replicas based on access frequency for content sharing in hybrid peer-to-peer networks. Int. J. Space-Based Situated Comput. 7(4), 197–206 (2017)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  • Shigenari Nakamura
    • 1
    Email author
  • Tomoya Enokido
    • 2
  • Makoto Takizawa
    • 3
  1. 1.Graduate School of Science and EngineeringHosei UniversityTokyoJapan
  2. 2.Faculty of Business AdministrationRissho UniversityTokyoJapan
  3. 3.Faculty of Science and EngineeringHosei UniversityTokyoJapan

Personalised recommendations