content-based publish/subscribe: a re-assessment

32
OTM/DOA 2005 31 October 2005 Content-Based Publish/Subscribe: A Re-Assessment David S. Rosenblum London Software Systems University College London

Upload: ziya

Post on 19-Mar-2016

22 views

Category:

Documents


2 download

DESCRIPTION

Content-Based Publish/Subscribe: A Re-Assessment. David S. Rosenblum London Software Systems University College London. Acknowledgments. Alexander L. Wolf Antonio Carzaniga Costin Raiciu. University of Lugano. University College London. The ‘Fire Hose’. Controlling the Fire Hose. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Content-Based Publish/Subscribe

:A Re-Assessment

David S. RosenblumLondon Software Systems

University College London

Page 2: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Acknowledgments

Alexander L. WolfAntonio Carzaniga

Costin Raiciu

University of Lugano

University College London

Page 3: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

The ‘Fire Hose’

Page 4: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Controlling the Fire Hose

Page 5: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Controlling the Fire Hose

Page 6: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Publish/Subscribe

symbol == MSFT&&

price > 30.00

symbol = MSFTprice = 29.34symbol = MSFTprice = 30.17symbol = IBMprice = 83.47

symbol = MSFTprice = 30.17

Page 7: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Publish/Subscribe Features Asynchronous delivery Multi-way delivery Content-driven interaction Anonymity Strong decoupling

Many applications are a natural fit

Page 8: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Some Ancient HistoryYEAST

Pub/sub for LANs of UNIX workstations

Centralised server implementation Novelty: Applications

Process awareness Office automation Telco feature deployment Many others .h

.cpp

Page 9: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Some More Recent HistorySIENA

Wide-area content-based publish/subscribe Decentralised overlay network ofpublish/subscribe ‘routers’

Routing and forwarding based onsubscription and notification content

Novelty:Algorithms, Protocols, ArchitecturesAssumed that the applications

would naturally appear!

Page 10: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Most RecentlyPreCache

Sony-funded startup to commercialise content-based publish/subscribe

Survived 2.5 years Successful technology development Less successful business development

Video-on-demand (???) Anti-virus updates Travel alerts

Page 11: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

So What Are the Killer Applications? Many research projects

Many novel research results

No significant deployments yet

Need to take a closer lookat some proposed approaches

Page 12: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

3

2

4

8

1

7

65

9

SIENA Content-Based RoutingSubscription Forwarding

as1

s1:a

s1:1

s1:2

s1:3

s1:2

s1:6

s1:3

s1:1

s1:5

s1: “price < 700”

Page 13: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

s2: “price < 600”

3

2

4

8

7

65

9

SIENA Content-Based Routing Subscription Merging

s1:1

s1:2

s1:6

s1:3

s1:1

s2b

s1:3

s1:2

s1:5

s1:1s2:5

s1:2s2:8

s1:5s2:b

as1 covers s2

1

s1 covers s2

s1:as1:as2:2

Page 14: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

3

2

4

8

1

7

65

9

SIENA Content-Based Routing Notification Delivery

b

s1:1s2:5

s1:2

s1:6

s1:3

s1:1s1:3

s1:2s2:8

a s1:as2:2

s1:5s2:b

n1: “price = 550”

n1

Page 15: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Implications of SIENA’s Design Notifications can be very frequent But subscriptions should be relatively infrequent

Yet there should be a lot of subscription variation

But there should be some similar subscriptions

And the similar subscriptions should come from the same part of the network Which applications are like this?

Page 16: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Other Approaches Gryphon

Subscription flooding over tree of clusters Applicable if subscriptions are few and stable

Hermes Rendezvous nodes allocated to content types

Applicable if load is spread evenly by type PreCache

Trie- and kd-tree-based subscription storage Applicable if unsubscription occurs very infrequently

All of these limit application suitability

Page 17: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Publish/Subscribe FeaturesConceptual Features

Asynchronous delivery

Multi-way delivery Content-driven interaction

Anonymity Strong decoupling

Few applications can naturally exploit these features

Infrastructure Features

Message flooding Subscription merging

Tree-based routing Localised forwarding

Content partitioning

Page 18: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

ExampleStock Quotes vs Online Gaming

Stock Quotes

Message flooding? Subscription merging Tree-based routing Localised forwarding Content partitioning

Online Gaming

Message flooding? Subscription merging

Tree-based routing? Localised forwarding

Content partitioning

One size infrastructure does not fit all

Page 19: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

???

Matching Applications with Infrastructures

Application Characteristics

Notification size Notification throughput

Notification latency Notification variability

Subscription selectivity

Subscription stability Locality …

Infrastructure Characteristics

Number of routers Number of routing hops

Path redundancy Subscription replication

Matching complexity Matching accuracy …

Page 20: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

ExampleStock Quotes vs Online Gaming

Stock Quotes

Notification size Notification frequency Notification variability

Notification latency Subscription selectivity

Subscription stability Locality

Online Gaming

Notification size Notification frequency Notification variability

Notification latency Subscription selectivity

Subscription stability? Locality

How do we translate these to design decisions?

Page 21: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Additional Complications Mobility

Of publishers Of subscribers Of routers

Firewalls Edge Fanout

Security

Page 22: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

The Value of Information

Can we do secure content-based routingover an untrusted infrastructure?

Page 23: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Security in Content-Based Publish/Subscribe Encryption used to implement many security goals Authentication Confidentiality Integrity

But content-based routing intrinsically requires some transparency of content Infrastructure must be able to determine if a

subscription matches notification Existing approaches have limited applicability

In large part due to need to secure multiple messages

Page 24: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

A Cryptographic Protocol Based on Yao’s Garbled Circuits Subscriptions transformed to Boolean circuits and then garbled based on shared secret

Notifications encrypted with shared secret

Router evaluates circuit on encrypted notification

Router knows result but not content!Weak but inexpensive security

Page 25: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Better security but very expensive

A Cryptographic Protocol Based on PSM PSM = Private Simultaneous Messages (Feige et al.)

Subscription matching transformed to graph reachability

Notifications and subscriptions transformed to subgraphs and encrypted based on shared secret

Router sums adjacency matrices for subgraphs Router checks rank of resulting matrix for match

Router knows result but not content!

Page 26: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Inherent Security Limitations(1)

Must provide confidentiality of both notifications and subscriptions Range of plaintext notifications can be matched against confidential subscription

Range of plaintext subscriptions can be matched against confidential notification

Router must know outcome of match This alone can sometimes be useful information Example: Battlefield Awareness

Page 27: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Inherent Security Limitations(2)

Router can determine subscription coverage over time Again, this may be useful information

Router can determine Euclidean distance between notifications over time

Studied protocols require sharing of secret among potentially large number of publishers and subscribers

Page 28: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Inherent Limitations of Possible Security Solutions Cryptographic group membership protocols

Too expensive with high subscription volatility Padding notification stream with dummy messages Reduces throughput and increases latency of

infrastructure Defeats the whole purpose of the infrastructure!

Proxy publishers and subscribers Increases latency of messages

Trusted infrastructure Can be expensive to deploy for each application

Page 29: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

A Generic Architecture for Content-Based Matching

Separates matching from routing Fully-connected mesh of N nodes in C clusters

Full connectivity simulated on DHT with minimal overhead

Choose 2 of 3 configuration parameters Subscription replication rate R (= N/C) Notification routing hops H (1 H C) Load-balancing factor B

Cluster 1

Cluster C

Cluster 3

Cluster 2

Cluster 4

Page 30: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

ConclusionThe Past

There have been many innovations in wide-area content-based publish/subscribe

But researchers have ignored application characteristics for too long

A universal infrastructure shared by all applications is probably not feasible

Security is very difficult to achieve over an untrusted infrastructure

Page 31: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

ConclusionThe Future

We need to understand better the relationship between application requirements and infrastructure design

And we need to explore further the limits of security in content-based publish/subscribe

Page 32: Content-Based Publish/Subscribe: A Re-Assessment

OTM/DOA 2005 31 October 2005

Questions?

Prof. David S. RosenblumLondon Software SystemsUniversity College London

[email protected]://www.cs.ucl.ac.uk/staff/D.Rosenblum/