405 research outputs found

    Object-based Information Flow Control in Peer-to-peer Publish/Subscribe Systems

    Get PDF
    Distributed systems are getting so scalable like IoT (Internet of Things) and P2P (Peer-to-Peer) systems that millions of devices are connected and support various types of applications. Here, distributed systems are required to be secure in addition to increasing the performance, reliability, and availability and reducing the energy consumption. In distributed systems, information in objects flows to other objects by transactions reading and writing data in the objects. Here, some information of an object may illegally flow to a subject which is not allowed to get the information of the object. Especially, a leakage of sensitive information is to be prevented from occurring. In order to keep information systems secure, illegal information flow among objects has to be prevented. Types of synchronization protocols are so far discussed based on read and write access rights in the RBAC (Role-Based Access Control) model to prevent illegal information flow.In this thesis, we newly propose a P2PPSO (P2P type of topic-based PS (Publish/Subscribe) with Object concept) model and discuss the models and protocols for information flow control. A P2PPSO model is composed of peer processes (peers) which communicate with one another by publishing and subscribing event messages. Each peer can both publish and receive event messages with no centralized coordinator compared with traditional centralized PS models. Each event message published by a source peer carries information to a target peer. The contents carried by an event message are considered to be composed of objects. An object is a unit of data resource. Objects are characterized by topics, and each event message is also characterized by topics named publication topics.In order to make a P2PPSO system secure, we first newly propose a TBAC (Topic-Based Access Control) model. Here, an access right is a pair ⟨t, op⟩ of a topic t and a publish or subscribe operation op. A peer is allowed to publish an event message with publication topics and subscribe interesting topics only if the publication and subscription access rights are granted to the peer, respectively. Suppose an event message e_j published by a peer p_j carries an object on some topics into a target peer p_i. Here, information in the peer p_j illegally flows to the peer p_i if the target peer p_i is not allowed to subscribe the topics. An illegal object is an object whose topics a target peer is not allowed to subscribe. Even if an event message is received by a target peer by checking topics, objects carried by the event message may be illegal at the target peer. Hence, first, we propose a TOBS (Topics-of-Objects-Based Synchronization) protocol to prevent target peers from being delivered illegal objects in the P2PPSO system. Here, even if an event message is received by a target peer, illegal objects in the event message are not delivered to the target peer.In the TOBS protocol, every event message is assumed to be causally delivered to every common target peer in the underlying network. Suppose an event message e_2 is delivered to a target peer p_i before another event message e_1 while the event message e_1 causally precedes the event message e_2 (e_1 →_c e_2). Here, the event message e_2 is premature at the peer p_i. Hence, secondly, we propose a TOBSCO (TOBS with Causally Ordering delivery) protocol where the function to causally deliver every pair of event messages is added to the TOBS protocol. Here, we assume the underlying network supports reliable communication among every pair of peers, i.e. no event message loss, no duplicate message, and the sending order delivery of messages. Every pair of event messages received by using topics are causally delivered to every common target peer by using the vector of sequence numbers.In the TOBS and TOBSCO protocols, objects delivered to target peers are held as replicas of the objects by the target peers. If a peer updates data of an object, the peer distributes event messages, i.e. update event messages, to update every replica of the object obtained by other peers. If a peer updates an object without changing topics, the object is referred to as altered. Here, an update event message for the altered object is meaningless since peers check only topics to exchange event messages. Hence, thirdly, we propose an ETOBSCO (Efficient TOBSCO) protocol where update event messages of objects are published only if topics of the objects are updated to reduce the network overhead.In the evaluation, first, we show how many numbers of event messages and objects are prevented from being delivered to target peers in the TOBS protocol. Next, we show every pair of event messages are causally delivered but it takes longer to deliver event messages in the TOBSCO protocol than the TOBS protocol. Finally, we show the fewer number of event messages are delivered while it takes longer to update replicas of altered objects in the ETOBSCO protocol than the TOBSCO protocol.博士(工学)法政大学 (Hosei University

    Raman Spectra of Soft Modes in Ferroelectric Crystals

    Get PDF
    The interpretation of Raman spectra of soft modes in ferroelectric crystals is not easy because of its over-damped line shape and the complicated temperature dependence near the transition temperature. There exist not a few cases which are difficult to determine the transition type is either order-disorder or displacive type. The main purpose of this paper is to point out the characteristics of Raman spectra of polar modes and several cautions for the analysis of soft modes. We discuss on some general properties of the susceptibility functions and also show possible reasons of confusion which might lead to the incorrect conclusions in the specific cases of KH2PO4 (KDP), ferroelectric SrTiO3 and proton–ordered Ice crystals

    Generation of large-amplitude coherent-state superposition via ancilla-assisted photon-subtraction

    Full text link
    We propose and demonstrate a novel method to generate a large-amplitude coherent-state superposition (CSS) via ancilla-assisted photon-subtraction. The ancillary mode induces quantum interference of indistinguishable processes, widening the controllability of quantum superposition at the conditional output. We demonstrate the concept in the time domain, by a simple time-separated two-photon subtraction from cw squeezed light. We observe the largest CSS ever reported without any corrections, which will enable various quantum information applications with CSS states.Comment: 5 pages, 4 figures; the revised versio

    Robust face recognition by combining projection-based image correction and decomposed eigenface

    Get PDF
    This work presents a robust face recognition method, which can work even when an insufficient number of images are registered for each person. The method is composed of image correction and image decomposition, both of which are specified in the normalized image space (NIS). The image correction [(F. Sakaue and T. Shakunaga, 2004), (T. Shakunaga and F. Sakaue, 2002)] is realized by iterative projections of an image to an eigenspace in NIS. It works well for natural images having various kinds of noise, including shadows, reflections, and occlusions. We have proposed decomposition of an eigenface into two orthogonal eigenspaces [T. Shakunaga and K. Shigenari, 2001], and have shown that the decomposition is effective for realizing robust face recognition under various lighting conditions. This work shows that the decomposed eigenface method can be refined by projection-based image correction

    Multimode theory of measurement-induced non-Gaussian operation on wideband squeezed light

    Full text link
    We present a multimode theory of non-Gaussian operation induced by an imperfect on/off-type photon detector on a splitted beam from a wideband squeezed light. The events are defined for finite time duration TT in the time domain. The non-Gaussian output state is measured by the homodyne detector with finite bandwidh BB. Under this time- and band-limitation to the quantm states, we develop a formalism to evaluate the frequency mode matching between the on/off trigger channel and the conditional signal beam in the homodyne channel. Our formalism is applied to the CW and pulsed schemes. We explicitly calculate the Wigner function of the conditional non-Gaussian output state in a realistic situation. Good mode matching is achieved for BT\alt1, where the discreteness of modes becomes prominant, and only a few modes become dominant both in the on/off and the homodyne channels. If the trigger beam is projected nearly onto the single photon state in the most dominant mode in this regime, the most striking non-classical effect will be observed in the homodyne statistics. The increase of BTBT and the dark counts degrades the non-classical effect.Comment: 20 pages, 14 figures, submitted to Phys. Rev.

    Practical purification scheme for decohered coherent-state superpositions via partial homodyne detection

    Full text link
    We present a simple protocol to purify a coherent-state superposition that has undergone a linear lossy channel. The scheme constitutes only a single beam splitter and a homodyne detector, and thus is experimentally feasible. In practice, a superposition of coherent states is transformed into a classical mixture of coherent states by linear loss, which is usually the dominant decoherence mechanism in optical systems. We also address the possibility of producing a larger amplitude superposition state from decohered states, and show that in most cases the decoherence of the states are amplified along with the amplitude.Comment: 8 pages, 10 figure

    Protocols to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems

    Get PDF
    In a peer-to-peer (P2P) type of topic-based subscribe/publish (P2PPS) model, each peer (process) can be a publisher and subscriber. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event message. Publications and subscriptions are specified in terms of topics. In the topic-based access control (TBAC) model proposed in our previous studies,only a peer granted publication and subscription access rights is allowed to publish event messages with publication topics and subscribe events, respectively. In our previous studies, the illegal information flow relation among peers is defined and the subscription-based synchronization (SBS) protocol is proposed to prevent illegal information flow. Here, topics carried by event messages are just accumulated in the target peers and notification of event messages which may cause illegal information flow are banned in each target peer. The more number of event messages are published, the more number of event messages are not notified in the system. In this paper, we newly propose a subscription initialization (SI) protocol where topics accumulated in peers are removed to reduce the number of notifications banned. We show the number of notifications banned is reduced in the SI protocol compared with the SBS protocol in the evaluation.Key Words : Information flow control, Peer-to-peer (P2P) model, Publish/subscribe (PS) systems, Subscription initialization (SI) protocol, Implicit topics, Topic-based access control (TBAC) mode
    corecore