International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 107

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption

Minakshi B. Shingan, Sanchika A. Bajpai


Abstract: Publish/subscribe systems has evolved as an striking communication model for building Internet-wide distributed systems by decoupling senders of messages from receivers. So far most of the research on publish/subscribe has focused on other areas such as efficient event routing, event filtering etc. Very trivial research has been published regarding securing publish/subscribe systems. In content based public subscribe systems authentication and confidentiality are basic security issues. In this paper we presents a new approach to provide confidentiality and authentication in a broker-less content-based publish/subscribe system. By using pairing based cryptography mechanism, authentication and confidentiality for public subscribe event is ensured. Additionally, an algorithm to cluster subscribers according to their subscriptions preserves a weak notion of subscription confidentiality. To enable efficient routing of encrypted events searchable encryption is provided. To support weak subscription confidentiality, multi credential routing a new event distribution method is provided. Also comprehensive analyses of different attacks on subscription confidentiality are provided. The overall methodology provides Key management for identity based encryption, cost for encryption decryption and routing based on subscription of attributes.


Keywords: Public Subscribe, Identity based encryption


Edition: Volume 3 Issue 11, November 2014,


Pages: 2704 - 2706


How to Cite this Article?

Minakshi B. Shingan, Sanchika A. Bajpai, "Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB1412, Volume 3 Issue 11, November 2014, 2704 - 2706

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Identity based encryption'

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3169 - 3172

A Survey on Secure Data Sharing and Collaboration Approaches in Cloud Computing

Prajakta Solapurkar, Girish Potdar

Share this Article

Downloads: 115

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2375 - 2378

A Survey Paper on Key Aggregate Cryptosystem: A Key Assignment Scheme for Scalable Data Sharing Over Cloud Storage

Rachana Gangwani, H. A. Hingoliwala

Share this Article

Similar Articles with Keyword 'Public'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Similar Articles with Keyword 'Subscribe'

Downloads: 106

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2234 - 2237

Analysis of Protective Mechanism in Roaming Network for Secure Communication

Ashwini A. Lokhande, Sonali U. Nimbhorkar

Share this Article

Downloads: 109

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1509 - 1512

Flamo: Filtering Algorithms for Location Based Publish/Subscribe on Moving Objects

Anu Mary Thomas, Laiji George

Share this Article

Similar Articles with Keyword 'Identity'

Downloads: 82

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Similar Articles with Keyword 'based'

Downloads: 136 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 105 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article
Top