Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1

Abstract

In past few years, Web has huge impact on distributed computing. The provisioning of fundamental security mechanisms like authentication and confidentiality for Sender/Receiver System is exceptionally difficult. Authentication of Senders and Receivers is hard to accomplish because of the loosely coupling of Senders and Receivers. Moreover, privacy of events and subscriptions conflicts with content based routing. This paper displays a novel methodology to provide confidentiality and authentication in Sender/Receiver System. By adapting pairing-based cryptography mechanisms, the authentication of Senders and Receivers and additionally confidentiality of events is guaranteed, to the needs of a Sender/Receiver system. Besides, an algorithm to cluster Receivers as respective of their subscriptions protects a weak notion of subscription privacy. There can be some improvements which can be doneto the existing systems [8]. Like 1) utilization of searchable encryption for allowing proficient routing of encrypted events, 2)Exhaustive examination of number of attacks on subscription confidentiality, and 3)Multicredential routing another event dissemination technique to reinforce the weak subscription confidentiality. The general methodology offers fine-grained key management and the expense for encryption, decryption, and routing is in the request of subscribed properties. In addition, the assessments demonstrate that providing security is reasonable with respect to 1) delay brought about amid the development of the Sender/Receiver overlay and the event dissemination,2) Throughput of the presented cryptographic primitives.

Authors and Affiliations

Keywords

Related Articles

The Graphene Sensor Technology

We all know that in recent modern era software is the basic requirement for operating almost every digital machine. So that we have to think about software and about creation of software which is efficient to fulfill the...

Evaluation Microbiological Air Contamination in Al Majmaah University

The presence of the bacteria in air indoors is a problem from the view of health protection. to estimate the health hazard and to create standards for indoor air quality control, the determination of indoor microorganism...

A Review on Implementation of Random Number Generation based on FPGA

"Random number generator is required extensively by many applications like cryptography, simulation, numerical analysis, text-to-speech etc. Most C libraries have a pair of library routines for initializing, and then gen...

Supplier Selection Methods for Small Scale Manufacturing Industry: A Review

Supplier Selection Methods for Small Scale Manufacturing Industry: A Review

The Effects of Integrated Marketing Communicationson Brand Equity of Authorized Automotives Companies in Indonesia

The aim of the research was to examine the effect of integrated marketing communications on brand equity at authorized automotive companies in Indonesia. In this research, the integrated marketing communications consist...

Download PDF file
  • EP ID EP340610
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

(2015). Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems. UNKNOWN, 4(1), -. https://europub.co.uk/articles/-A-340610