Content-Based Publish/Subscribe: A Re-Assessment David S. Rosenblum London Software Systems University College London OTM/DOA 2005 31 October 2005 Acknowledgments Alexander L. Wolf Antonio Carzaniga Costin Raiciu University of Lugano University College London OTM/DOA 2005 31 October 2005 The ‘Fire Hose’ OTM/DOA 2005 31 October 2005 Controlling the Fire Hose OTM/DOA 2005 31 October 2005 Controlling the Fire Hose OTM/DOA 2005 31 October 2005 Publish/Subscribe symbol symbol==MSFT IBM price = 83.47 29.34 30.17 symbol == MSFT && price > 30.00 symbol = MSFT price = 30.17 OTM/DOA 2005 31 October 2005 Publish/Subscribe Features Asynchronous delivery Multi-way delivery Content-driven interaction Anonymity Strong decoupling Many applications are a natural fit OTM/DOA 2005 31 October 2005 Some Ancient History YEAST Pub/sub for LANs of UNIX workstations Centralised server implementation Novelty: Applications Process awareness Office automation Telco feature deployment Many others .h OTM/DOA 2005 31 October 2005 .cpp Some More Recent History SIENA Wide-area content-based publish/subscribe Decentralised overlay network of publish/subscribe ‘routers’ Routing and forwarding based on subscription and notification content Novelty: Algorithms, Protocols, Architectures Assumed that the applications would naturally appear! OTM/DOA 2005 31 October 2005 Most Recently PreCache Sony-funded startup to commercialise content-based publish/subscribe Survived 2.5 years Successful technology development Less successful business development Video-on-demand (???) Anti-virus updates Travel alerts OTM/DOA 2005 31 October 2005 So What Are the Killer Applications? Many research projects Many novel research results No significant deployments yet Need to take a closer look at some proposed approaches OTM/DOA 2005 31 October 2005 SIENA Content-Based Routing Subscription Forwarding s1:1 s1 a 1 s1: “price < 700” 2 s1:a s1:2 s1:2 s1:1 3 5 4 s1:3 6 s1:3 s1:5 8 s1:6 OTM/DOA 2005 31 October 2005 9 7 SIENA Content-Based Routing Subscription Merging s1 covers s2 a 1 s1:a s1:a s2:2 s1:2 s1:2 s2:8 s1:1 b s2 4 s1:1 s1:1 s2:5 ss1:covers s<2 600” “price 2 2 s1:2 3 5 s1:3 6 s1:3 s1:5 s1:5 s2:b 8 s1:6 OTM/DOA 2005 31 October 2005 9 7 SIENA Content-Based Routing Notification Delivery a 1 s1:a s2:2 s1:2 s2:8 s1:1 4 s1:1 s2:5 n1: “price = 550” 2 s1:2 3 5 s1:3 6 s1:3 b s1:5 s2:b 8 s1:6 OTM/DOA 2005 31 October 2005 9 7 n1 Implications of SIENA’s Design Notifications can be very frequent But subscriptions should be relatively infrequent Yet there should be a lot of subscription variation But there should be some similar subscriptions And the similar subscriptions should come from the same part of the network Which applications are like this? OTM/DOA 2005 31 October 2005 Other Approaches Gryphon Subscription flooding over tree of clusters Hermes Rendezvous nodes allocated to content types Applicable if subscriptions are few and stable Applicable if load is spread evenly by type PreCache Trie- and kd-tree-based subscription storage Applicable if unsubscription occurs very infrequently All of these limit application suitability OTM/DOA 2005 31 October 2005 Publish/Subscribe Features Conceptual Features Asynchronous delivery Multi-way delivery Content-driven interaction Anonymity Strong decoupling Infrastructure Features Message flooding Subscription merging Tree-based routing Localised forwarding Content partitioning Few applications can naturally exploit these features OTM/DOA 2005 31 October 2005 Example Stock Quotes vs Online Gaming Stock Quotes Online Gaming Message flooding ? Subscription merging Tree-based routing Localised forwarding Content partitioning Message flooding Subscription merging Tree-based routing Localised forwarding Content partitioning ? ? One size infrastructure does not fit all OTM/DOA 2005 31 October 2005 Matching Applications with Infrastructures Application Characteristics Notification size Notification throughput Notification latency Notification variability Subscription selectivity Subscription stability Locality … OTM/DOA 2005 Infrastructure Characteristics ??? Number of routers Number of routing hops Path redundancy Subscription replication Matching complexity Matching accuracy … 31 October 2005 Example Stock Quotes vs Online Gaming Stock Quotes Online Gaming Notification size Notification frequency Notification variability Notification latency Subscription selectivity Subscription stability Locality Notification size Notification frequency Notification variability Notification latency Subscription selectivity Subscription stability ? Locality How do we translate these to design decisions? OTM/DOA 2005 31 October 2005 Additional Complications Mobility Of publishers Of subscribers Of routers Firewalls Edge Fanout Security OTM/DOA 2005 31 October 2005 The Value of Information Can we do secure content-based routing over an untrusted infrastructure? OTM/DOA 2005 31 October 2005 Security in Content-Based Publish/Subscribe Encryption used to implement many security goals But content-based routing intrinsically requires some transparency of content Authentication Confidentiality Integrity Infrastructure must be able to determine if a subscription matches notification Existing approaches have limited applicability In large part due to need to secure multiple messages OTM/DOA 2005 31 October 2005 A Cryptographic Protocol Based on Yao’s Garbled Circuits Subscriptions transformed to Boolean circuits and then garbled based on shared secret Notifications encrypted with shared secret Router evaluates circuit on encrypted notification Router knows result but not content! Weak but inexpensive security OTM/DOA 2005 31 October 2005 A Cryptographic Protocol Based on PSM PSM = Private Simultaneous Messages (Feige et al.) Subscription matching transformed to graph reachability Notifications and subscriptions transformed to subgraphs and encrypted based on shared secret Router sums adjacency matrices for subgraphs Router checks rank of resulting matrix for match Router knows result but not content! Better security but very expensive OTM/DOA 2005 31 October 2005 Inherent Security Limitations (1) Must provide confidentiality of both notifications and subscriptions Range of plaintext notifications can be matched against confidential subscription Range of plaintext subscriptions can be matched against confidential notification Router must know outcome of match This alone can sometimes be useful information Example: Battlefield Awareness OTM/DOA 2005 31 October 2005 Inherent Security Limitations (2) Router can determine subscription coverage over time Again, this may be useful information Router can determine Euclidean distance between notifications over time Studied protocols require sharing of secret among potentially large number of publishers and subscribers OTM/DOA 2005 31 October 2005 Inherent Limitations of Possible Security Solutions Cryptographic group membership protocols Padding notification stream with dummy messages Reduces throughput and increases latency of infrastructure Defeats the whole purpose of the infrastructure! Proxy publishers and subscribers Too expensive with high subscription volatility Increases latency of messages Trusted infrastructure Can be expensive to deploy for each application OTM/DOA 2005 31 October 2005 A Generic Architecture for Content-Based Matching Cluster 2 Cluster 3 Cluster 1 Cluster 4 Cluster C Separates matching from routing Fully-connected mesh of N nodes in C clusters Full connectivity simulated on DHT with minimal overhead Choose 2 of 3 configuration parameters Subscription replication rate R (= N/C) Notification routing hops H (1 H C) Load-balancing factor B OTM/DOA 2005 31 October 2005 Conclusion The Past There have been many innovations in widearea content-based publish/subscribe But researchers have ignored application characteristics for too long A universal infrastructure shared by all applications is probably not feasible Security is very difficult to achieve over an untrusted infrastructure OTM/DOA 2005 31 October 2005 Conclusion The Future We need to understand better the relationship between application requirements and infrastructure design And we need to explore further the limits of security in content-based publish/subscribe OTM/DOA 2005 31 October 2005 Questions? Prof. David S. Rosenblum London Software Systems University College London [email protected] http://www.cs.ucl.ac.uk/staff/D.Rosenblum/ OTM/DOA 2005 31 October 2005
© Copyright 2026 Paperzz