Causally ordering delivery of event messages in P2PPSO systems

Abstract In topic-based PS (Publish/Subscribe) model, each peer process (peer) specifies subscription topics and publishes an event message with publication topics. A peer only receives an event message whose publication topics include some common topic with the subscription topics. In the P2PPSO (P2P (peer-to-peer) type of topic-based Publish/Subscribe with Object concept) model, each peer exchanges objects by publishing and receiving event messages with no centralized coordinator. Here, objects are denoted by topics and event messages are characterized by topics of the objects in the event messages. Suppose an event message e j published by a peer p j carries objects on some topics into a target peer p i . Information, i.e. objects in the peer p j illegally flows to the peer p i if the peer p i is not allowed to subscribe the topics. An illegal object of a peer p i is an object whose topics the peer p i is not allowed to subscribe. In the TOBS (Topics-of-Objects-Based Synchronization) protocol, illegal objects are not delivered to target peers, but every event message is assumed to be causally delivered in the underlying network. In this paper, we newly propose a TOBSCO (TOBS with Causally Ordering delivery) protocol where the function to causally deliver every pair of event messages is added to the TOBS protocol. In the evaluation, we show every pair of event messages are causally delivered and it takes longer to deliver event messages in the TOBSCO protocol.

[1]  Akihito Nakamura,et al.  Causally ordering broadcast protocol , 1994, 14th International Conference on Distributed Computing Systems.

[2]  Lidia Ogiela,et al.  Intelligent techniques for secure financial management in cloud computing , 2015, Electron. Commer. Res. Appl..

[3]  Tomoya Enokido,et al.  A flexible read-write abortion protocol with role safety concept to prevent illegal information flow , 2018, J. Ambient Intell. Humaniz. Comput..

[4]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .

[5]  Tomoya Enokido,et al.  A topic-based synchronisation protocol in peer-to-peer publish/subscribe systems , 2020, Int. J. Commun. Networks Distributed Syst..

[6]  Paulo S. C. Alencar,et al.  Event Models in Distributed Event Based Systems , 2010, Principles and Applications of Distributed Event-Based Systems.

[7]  Andreas Reuter,et al.  Transaction Processing: Concepts and Techniques , 1992 .

[8]  Urszula Ogiela,et al.  Visual CAPTCHA application in linguistic cryptography , 2018, Concurr. Comput. Pract. Exp..

[9]  Tomoya Enokido,et al.  Purpose-Based Information Flow Control for Cyber Engineering , 2011, IEEE Transactions on Industrial Electronics.

[10]  Fatos Xhafa,et al.  JXTA-Overlay: A P2P Platform for Distributed, Collaborative, and Ubiquitous Computing , 2011, IEEE Transactions on Industrial Electronics.

[11]  Urszula Ogiela,et al.  Linguistic techniques for cryptographic data sharing algorithms , 2018, Concurr. Comput. Pract. Exp..

[12]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[13]  Maarten van Steen,et al.  PolderCast: Fast, Robust, and Scalable Architecture for P2P Topic-Based Pub/Sub , 2012, Middleware.

[14]  Ravi S. Sandhu,et al.  Lattice-based access control models , 1993, Computer.

[15]  Dilawaer Duolikun,et al.  Read-abortion (RA) based synchronization protocols to prevent illegal information flow , 2015, Journal of computer and system sciences (Print).

[16]  Marek R. Ogiela,et al.  Bio-Inspired Cryptographic Techniques in Information Management Applications , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[17]  Dilawaer Duolikun,et al.  A read-write abortion protocol to prevent illegal information flow in role-based access control systems , 2016, Int. J. Space Based Situated Comput..

[18]  Naohiro Hayashibara,et al.  Merging Topic Groups of a Publish/Subscribe System in Causal Order , 2017, 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA).

[19]  David M. Eyers,et al.  Access control in publish/subscribe systems , 2008, DEBS.

[20]  Ravi S. Sandhu,et al.  Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.

[21]  Marek R. Ogiela,et al.  On Using Cognitive Models in Cryptography , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[22]  Tomoya Enokido,et al.  Information flow control in object‐based peer‐to‐peer publish/subscribe systems , 2020, Concurr. Comput. Pract. Exp..

[23]  Tomoya Enokido,et al.  A Flexible Synchronization Protocol to Learn Hidden Topics in P2PPS Systems , 2019, Trans. Comput. Collect. Intell..

[24]  Anne-Marie Kermarrec,et al.  The many faces of publish/subscribe , 2003, CSUR.

[25]  Eduardo B. Fernandez,et al.  Database Security and Integrity , 1981 .

[26]  J. Wenny Rahayu,et al.  Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments , 2012, J. Comput. Syst. Sci..

[27]  Leslie Lamport,et al.  Time, clocks, and the ordering of events in a distributed system , 1978, CACM.

[28]  Tomoya Enokido,et al.  Scalable Group Communication Protocols in the Peer-to-Peer Model of Topic-Based Publish/Subscribe Systems , 2016, 2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS).

[29]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[30]  Tomoya Enokido,et al.  An information flow control model in a topic-based publish/subscribe system , 2018, J. High Speed Networks.