Multi Credential Routing a New Event Dissemination Strategy Which Strengthens The Weak Subscription Confidentiality
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
The provisioning of basic safety devices such as authentication and confidentiality is extremely challenging in a content based publish/subscribe system. Authentication of publishers and subscribers is not easy to get due to the loose coupling of publishers and subscribers. We also present extensions of the cryptographic methods to offer proficient routing of encrypted events by using the idea of searchable encryption. “Multi credential routing” a new event dissemination policy which braces the weak subscription confidentiality, and a thorough breakdown of different attacks on subscription confidentiality. Published events are routed to their appropriate subscribers, without the publishers knowing the relevant set of subscribers, or vice versa. This decoupling is conventionally ensured by intermediate routing over a broker network. In more recent systems, publishers and subscribers organize themselves in a broker-less routing infrastructure, shape an event forwarding overlay.
Authors and Affiliations
Jyothi Vepada, D. Srinivas
A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam
In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then r...
Wavelet Based Dual Encoding Lossless Medical Image Compression
Medical image compression using dual encoding scheme which helps in lossless image compression and wavelet helps in increasing the sparsity of the image. Dual encoding scheme comprised with Run length Coding and 8X8...
Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network
Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb...
An Overview on Template Matching Methodologies and its Applications
A very common task in pattern recognition is template matching. The detection and recognition of objects in images is a key research topic in the computer vision community. Within this area, image recognition and in...
A Freight Stabilization Model Based On Cloud Segregating For the Shared Cloud
Cloud computing having tremendous growth on recent years but it is not segregation on shared clouds. Clouds are most provably used for huge amount of data storage and communication. "The cloud", also focuses on incre...