Secure Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
publish–subscribe is a messaging pattern where senders of messages, called publishers, do not program the messages to be sent directly to specific receivers, called subscribers. provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content based publish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based routing. This paper presents a novel approach to provide confidentiality and authentication in a broker-less content-based publish/subscribe system. The authentication of publishers and subscribers as well as confidentiality of events is ensured, by adapting the pairing-based cryptography mechanisms, to the needs of a publish/subscribe system. Furthermore, an algorithm to cluster subscribers according to their subscriptions preserves a weak notion of subscription confidentiality. In addition to our previous work [20], this paper contributes 1) use of searchable encryption to enable efficient routing of encrypted events, 2) multicredential routing a new event dissemination strategy to strengthen the weak subscription confidentiality, and 3) thorough analysis of different attacks on subscription confidentiality. The overall approach provides fine-grained key management and the cost for encryption, decryption, and routing is in the order of subscribed attributes. Moreover, the evaluations show that providing security is affordable w.r.t. 1) throughput of the proposed cryptographic primitives, and 2) delays incurred during the construction of the publish/subscribe overlay and the event dissemination.
Authors and Affiliations
Vundrajavarapu Ajay Kumar| M.Tech (IT), S.R.K.R Engineering College, A.P., India, Sri K. Satyanarayana Raju| Asst Professor, Dept. of Information Technology, S.R.K.R Engineering College, A.P., India
Interpreting Pursuit Outcomes from Data Web Bases
The Internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexib...
Seculation Routing With Fortification Wireless Networks
Wireless sensor networks having so many problems a number of solutios enough? security issues, discusses some existing solutions, and suggests possible research directions like key establishment secrecy,authenticatio...
Grid Connected Single Phase Rooftop Pv System With Limited Reactive Power Supply
In this paper SRF theory based PV system with MPPT DC-DC controller for grid connected single phase rooftop system have been presented. Photovoltaic (PV) systems are the alternative source of generation because these...
Novel Visual Authentication Protocols to Defend Key Logging Issues
The best approach to accomplish secure correspondence is to have validation convention, which is a sort of cryptographic convention with the reason for confirming substances. The configuration of secure validation co...
Scattered security system for mobile networks through Assorted Contraption
Malware is malevolent programming which irritates the system PC operation, hacking the touchy data and gets to the private frameworks. It is only a project which is particularly intended to harm the PC it might be an...