Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption
Minakshi B. Shingan, Sanchika A. Bajpai
Abstract: Publish/subscribe systems has evolved as an striking communication model for building Internet-wide distributed systems by decoupling senders of messages from receivers. So far most of the research on publish/subscribe has focused on other areas such as efficient event routing, event filtering etc. Very trivial research has been published regarding securing publish/subscribe systems. In content based public subscribe systems authentication and confidentiality are basic security issues. In this paper we presents a new approach to provide confidentiality and authentication in a broker-less content-based publish/subscribe system. By using pairing based cryptography mechanism, authentication and confidentiality for public subscribe event is ensured. Additionally, an algorithm to cluster subscribers according to their subscriptions preserves a weak notion of subscription confidentiality. To enable efficient routing of encrypted events searchable encryption is provided. To support weak subscription confidentiality, multi credential routing a new event distribution method is provided. Also comprehensive analyses of different attacks on subscription confidentiality are provided. The overall methodology provides Key management for identity based encryption, cost for encryption decryption and routing based on subscription of attributes.
Keywords: Public Subscribe, Identity based encryption
Edition: Volume 3 Issue 11, November 2014,
Pages: 2704 - 2706
How to Cite this Article?
Minakshi B. Shingan, Sanchika A. Bajpai, "Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB1412, Volume 3 Issue 11, November 2014, 2704 - 2706
How to Share this Article?
Similar Articles with Keyword 'Identity based encryption'
A Survey on Secure Data Sharing and Collaboration Approaches in Cloud Computing
Prajakta Solapurkar, Girish Potdar
A Survey Paper on Key Aggregate Cryptosystem: A Key Assignment Scheme for Scalable Data Sharing Over Cloud Storage
Rachana Gangwani, H. A. Hingoliwala
Similar Articles with Keyword 'Public'
Load Balancing in Cloud Computing Using Optimization Algorithm
Manpreet Kaur, Dr. Amandeep Kaur
Conceptual Modeling of a Tramcar
Iftikhar B. Abbasov, Viacheslav V. Orekhov
Similar Articles with Keyword 'Subscribe'
Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
Flamo: Filtering Algorithms for Location Based Publish/Subscribe on Moving Objects
Anu Mary Thomas, Laiji George
Similar Articles with Keyword 'Identity'
Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics
Nisha, Jatinder Kansal, JPS Raina
Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System
Digvijay A. Patil, Yogesh B. Gurav
Similar Articles with Keyword 'based'
Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Similar Articles with Keyword 'encryption'
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Privacy Preserving Utility Verification of Data Published