Skip to main content

Malicious Information Flow in P2PPS Systems

  • Conference paper
  • First Online:
Advances in Internet, Data & Web Technologies (EIDWT 2018)

Abstract

We consider the peer-to-peer (P2P) type of topic-based publish/subscribe (P2PPS) model where each process (peer) can publish and subscribe event messages with no centralized coordinator. An event message \(e_1\) may carry information of another event message \(e_2\) causally preceding \(e_1\), which are denoted by topics. If a peer receiving \(e_1\) is not allowed to subscribe the topics, illegal information flow to the peer occur. In our previous studies, the subscription-based synchronization (SBS), topic-based synchronization (TBS), and flexible synchronization for hidden topics (FS-H) protocols are proposed to prevent illegal information flow. In this paper, we newly consider malicious information flow among peers where a source peer does not give related topics or gives unrelated topics to event messages. If a source peer \(p_i\) publishes an event message e without including some related topic or with including some unrelated topic, the peer \(p_i\) is malicious. In this paper, we newly define types of malicious information flow among peers based on a set of topics which every peer can publish and subscribe.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Google alert. http://www.google.com/alerts

  2. Blanco, R., Alencar, P.: Event models in distributed event based systems. In: Principles and Applications of Distributed Event-Based Systems, pp. 19–42 (2010)

    Google Scholar 

  3. Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Reading (1982)

    MATH  Google Scholar 

  4. Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. ACM Comput. Surv. 35(2), 114–131 (2003)

    Article  Google Scholar 

  5. Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Controls, 2nd edn. Artech, Boston (2007)

    MATH  Google Scholar 

  6. Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A flexible read-write abortion protocol to prevent illegal information flow among objects. J. Mob. Multimed. 11(3&4), 263–280 (2015)

    Google Scholar 

  7. Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A write abortion-based protocol in role-based access control systems. Int. J. Adapt. Innov. Syst. 2(2), 142–160 (2015)

    Article  Google Scholar 

  8. Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion (RWA) protocol to prevent illegal information flow in role-based access control systems. Int. J. Space Based Situat. Comput. 6(1), 43–53 (2016)

    Article  Google Scholar 

  9. Nakamura, S., Duolikun, D., Takizawa, M.: Read-abortion (RA) based synchronization protocols to prevent illegal information flow. J. Comput. Syst. Sci. 81(8), 1441–1451 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  10. Nakamura, S., Enokido, T., Takizawa, M.: Information flow control models in peer-to-peer publish/subscribe systems. In: Proceedings of the 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2016), pp. 167–174 (2016)

    Google Scholar 

  11. Nakamura, S., Enokido, T., Takizawa, M.: Subscription initialization (SI) protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Proceedings of the 19th International Conference on Network-Based Information Systems (NBiS-2016), pp. 42–49 (2016)

    Google Scholar 

  12. Nakamura, S., Enokido, T., Takizawa, M.: Topic-based synchronization (THS) protocols to prevent illegal information flow in peer-to-peerpublish/subscribe systems. In: Proceedings of the 11th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2016), pp. 57–68 (2016)

    Google Scholar 

  13. Nakamura, S., Enokido, T., Takizawa, M.: Sensitivity-based synchronization protocol to prevent illegal information flow among objects. Int. J. Web Grid Serv. (IJWGS) 13(3), 315–333 (2017)

    Article  Google Scholar 

  14. Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: A flexible synchronization protocol for hidden topics to prevent illegal information flow in P2PPS systems. In: Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2017), pp. 138–148 (2017)

    Google Scholar 

  15. Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Flexible synchronization protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017), pp. 82–93 (2017)

    Google Scholar 

  16. Nakayama, H., Duolikun, D., Enokido, T., Takizawa, M.: Selective delivery of event messages in peer-to-peer topic-based publish/subscribe systems. In: Proceedings of the 18th International Conference on Network-Based Information Systems (NBiS-2015), pp. 379–386 (2015)

    Google Scholar 

  17. Nakayama, H., Duolikun, D., Enokido, T., Takizawa, M.: Reduction of unnecessarily ordered event messages in peer-to-peer model of topic-based publish/subscribe systems. In: Proceedings of IEEE the 30th International Conference on Advanced Information Networking and Applications (AINA-2016), pp. 1160–1167 (2016)

    Google Scholar 

  18. Setty, V., van Steen, M., Vitenberg, R., Voulgaris, S.: PolderCast: fast, robust, and scalable architecture for P2P topic-based pub/sub. In: Proccedings of ACM/IFIP/USENIX 13th International Conference on Middleware (Middleware 2012), pp. 271–291 (2012)

    Google Scholar 

  19. Tarkoma, S.: Publish/Subscribe System: Design and Principles, 1st edn. Wiley, Hoboken (2012)

    Book  Google Scholar 

  20. Waluyo, A.B., Taniar, D., Rahayu, W., Aikebaier, A., Takizawa, M., Srinivasan, B.: Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments. J. Comput. Syst. Sci. (JCSS) 78(6), 1716–1736 (2012)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by Japan Society for the Promotion of Scienc (JSPS) KAKENHI 15H0295 and Grant-in-Aid for JSPS Research Fellow grant 17J00106.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shigenari Nakamura .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M. (2018). Malicious Information Flow in P2PPS Systems. In: Barolli, L., Xhafa, F., Javaid, N., Spaho, E., Kolici, V. (eds) Advances in Internet, Data & Web Technologies. EIDWT 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 17. Springer, Cham. https://doi.org/10.1007/978-3-319-75928-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75928-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75927-2

  • Online ISBN: 978-3-319-75928-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics