Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)Publication Date: 2014-11-05
Authors : Minakshi B. Shingan; Sanchika A. Bajpai;
Page : 2704-2706
Keywords : Public Subscribe; Identity based encryption;
Abstract
Publish/subscribe systems has evolved as an striking communication model for building Internet-wide distributed systems by decoupling senders of messages from receivers. So far most of the research on publish/subscribe has focused on other areas such as efficient event routing, event filtering etc. Very trivial research has been published regarding securing publish/subscribe systems. In content based public subscribe systems authentication and confidentiality are basic security issues. In this paper we presents a new approach to provide confidentiality and authentication in a broker-less content-based publish/subscribe system. By using pairing based cryptography mechanism, authentication and confidentiality for public subscribe event is ensured. Additionally, an algorithm to cluster subscribers according to their subscriptions preserves a weak notion of subscription confidentiality. To enable efficient routing of encrypted events searchable encryption is provided. To support weak subscription confidentiality, multi credential routing a new event distribution method is provided. Also comprehensive analyses of different attacks on subscription confidentiality are provided. The overall methodology provides Key management for identity based encryption, cost for encryption decryption and routing based on subscription of attributes.
Other Latest Articles
- Multi-Failure Recovery System with the Help of Ex SensRob in WSAN
- A Review on Provisioning of Services in Cloud Computing
- Content Based Image Retrieval Using Automatic Image Annotation
- Cryptographic Key Management Technique in Hierarchical Wireless Sensor Networks
- Efficient and Confident Sharing of Personal Healthcare Records using Attribute Based Encryption in Cloud Computing
Last modified: 2021-06-30 21:12:54