Multi Credential Routing a New Event Dissemination Strategy Which Strengthens The Weak Subscription Confidentiality
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
The provisioning of basic safety devices such as authentication and confidentiality is extremely challenging in a content based publish/subscribe system. Authentication of publishers and subscribers is not easy to get due to the loose coupling of publishers and subscribers. We also present extensions of the cryptographic methods to offer proficient routing of encrypted events by using the idea of searchable encryption. “Multi credential routing” a new event dissemination policy which braces the weak subscription confidentiality, and a thorough breakdown of different attacks on subscription confidentiality. Published events are routed to their appropriate subscribers, without the publishers knowing the relevant set of subscribers, or vice versa. This decoupling is conventionally ensured by intermediate routing over a broker network. In more recent systems, publishers and subscribers organize themselves in a broker-less routing infrastructure, shape an event forwarding overlay.
Authors and Affiliations
Jyothi Vepada, D. Srinivas
Implementation and Analysis of Modeling of Brain Surgery Simulation for Patient
A proposed real-time neurosurgery simulator handles skull drilling and surgical interaction with the brain. This involves the development and combination of areas such as collision handling, haptic rendering, physica...
Design of Mobile Ad hoc Network with AODV Routing Protocol
A mobile ad hoc network [MANET] is a selfconfiguring infrastructureless network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change...
Energy Efficient Group Key Management For Secure Data Processing In Ad hoc Networks
The key management is the course of action of maintaining the secret key between the sender and receiver. By means of this key the sender can encrypt the data which is broadcasted to the receiver and send it with the...
Incorporating Human Behavioral Patterns in Big Data Text Analytics
One of the modern day emerging technologies include Big Data Analysis. Big Data refers to the huge terabytes of data being collected on internet web sites such as Facebook, Twitter etc, Machine data such as sensors an...
Performance of Different Bow Tie Antennas In Fresh Water
In this paper, the performance of a different microstrip fed bow tie antennas in water is studied. The antennas are designed and simulated using the simulator tool HFSS (High Frequency Structure Simulator). The antenna...