Skip to main content

A Flexible Synchronization Protocol for Hidden Topics to Prevent Illegal Information Flow in P2PPS Systems

  • Conference paper
  • First Online:
Advances on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2017)

Abstract

We consider the peer-to-peer (P2P) type of topic-based publish/subscribe (P2PPS) model where each process (peer) can publish and subscribe event messages with no centralized coordinator. Here, event messages on hidden topics which a peer can subscribe but a target peer cannot subscribe are notified to target peers. After an event message \(e_1\) with hidden topics is notified, if a peer publishes another event message \(e_2\), the event message \(e_2\) may be related with the hidden topics. Hence, if the event message is notified to another peer which does not subscribe the hidden topics, illegal information flow occur. In this paper, we newly propose an FS-H (Flexible Synchronization for Hidden topics) protocol where a peer obtains hidden topics in the subscription if the hidden topics are related with the subscription topics. In the evaluation, the fewer number of notifications are banned in the FS-H protocol than the other protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Google alert. http://www.google.com/alerts

  2. Blanco, R., Alencar, P.: Event models in distributed event based systems. In: Principles and Applications of Distributed Event-Based Systems, pp. 19–42 (2010)

    Google Scholar 

  3. Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Boston (1982)

    MATH  Google Scholar 

  4. Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. ACM Comput. Surv. 35(2), 114–131 (2003)

    Article  Google Scholar 

  5. Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Controls, 2nd edn. Artech, Norwood (2007)

    MATH  Google Scholar 

  6. Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A flexible read-write abortion protocol to prevent illegal information flow among objects. J. Mobile Multimed. 11(3&4), 263–280 (2015)

    Google Scholar 

  7. Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A write abortion-based protocol in role-based access control systems. Int. J. Adapt. Innov. Syst. 2(2), 142–160 (2015)

    Article  Google Scholar 

  8. Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion (RWA) protocol to prevent illegal information flow in role-based access control systems. Int. J. Space-Based Situated Comput. 6(1), 43–53 (2016)

    Article  Google Scholar 

  9. Nakamura, S., Duolikun, D., Takizawa, M.: Read-abortion (RA) based synchronization protocols to prevent illegal information flow. J. Comput. Syst. Sci. 81(8), 1441–1451 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  10. Nakamura, S., Enokido, T., Takizawa, M.: Information flow control models in peer-to-peer publish/subscribe systems. In: Proceedings of the 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2016), pp. 167–174 (2016)

    Google Scholar 

  11. Nakamura, S., Enokido, T., Takizawa, M.: Subscription initialization (SI) protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Proceedings of the 19th International Conference on Network-Based Information Systems (NBiS-2016), pp. 42–49 (2016)

    Google Scholar 

  12. Nakamura, S., Enokido, T., Takizawa, M.: Topic-based synchronization (TBS) protocols to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Proceedings of the 11th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2016), pp. 57–68 (2016)

    Google Scholar 

  13. Nakamura, S., Enokido, T., Takizawa, M.: Sensitivity-based synchronization protocol to prevent illegal information flow among objects. Int. J. Web Grid Serv. (IJWGS) 13(3), 315–333 (2017)

    Article  Google Scholar 

  14. Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Flexible synchronization protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Barolli, L., Terzo, O. (eds.) CISIS 2017. AISC, vol. 611, pp. 82–93. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-61566-0_8

    Chapter  Google Scholar 

  15. Nakayama, H., Duolikun, D., Enokido, T., Takizawa, M.: Selective delivery of event messages in peer-to-peer topic-based publish/subscribe systems. In: Proceedings of the 18th International Conference on Network-Based Information Systems (NBiS-2015), pp. 379–386 (2015)

    Google Scholar 

  16. Nakayama, H., Duolikun, D., Enokido, T., Takizawa, M.: Reduction of unnecessarily ordered event messages in peer-to-peer model of topic-based publish/subscribe systems. In: Proceedings of IEEE the 30th International Conference on Advanced Information Networking and Applications (AINA-2016), pp. 1160–1167 (2016)

    Google Scholar 

  17. Setty, V., van Steen, M., Vitenberg, R., Voulgaris, S.: Poldercast: Fast, robust, and scalable architecture for P2P topic-based pub/sub. In: Proceedings of ACM/IFIP/USENIX 13th International Conference on Middleware (Middleware 2012), pp. 271–291 (2012)

    Google Scholar 

  18. Tarkoma, S.: Publish/Subscribe System: Design and Principles, 1st edn. Wiley, Hoboken (2012)

    Book  Google Scholar 

  19. Waluyo, A.B., Taniar, D., Rahayu, W., Aikebaier, A., Takizawa, M., Srinivasan, B.: Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments. J. Comput. Syst. Sci. (JCSS) 78(6), 1716–1736 (2012)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgement

This work was supported by Japan Society for the Promotion of Science (JSPS) KAKENHI 15H0295 and Grant-in-Aid for JSPS Research Fellow grant 17J00106.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shigenari Nakamura .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M. (2018). A Flexible Synchronization Protocol for Hidden Topics to Prevent Illegal Information Flow in P2PPS Systems. In: Barolli, L., Xhafa, F., Conesa, J. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 12. Springer, Cham. https://doi.org/10.1007/978-3-319-69811-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69811-3_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69810-6

  • Online ISBN: 978-3-319-69811-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics