Downloads: 135 | Views: 144
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015
A Survey on Encryption Methods for Providing Security in Pub/Sub System
Onkar P. Kasarlewar | P. S. Desai [4]
Abstract: Internet has changed the world of distributed computing significantly. Peer-to-peer communication mechanism making system more rigid and static applications in distributed system, making a way to loosely coupled infrastructure. This can be achieved by Publish/Subscribe system. As it has group of large unpredictable subscribers, developing a reliable Publish/Subscribe System is challenging task to perform. Many-to-many communications and loosely coupling of publishers, subscribers is strength of Publish/Subscribe. It has huge demand. Because of this, security issue arises. For that, mechanisms like The cost for encryption-decryption, fine grained key management and the pairing-based cryptography mechanisms, and routing is in the order of subscribed attributes are already implemented. Broker-less content-based publish/subscribe system do not tackle the problem of confidentiality at all. So to that, there is scope for providing confidentiality and authenticities in a broker-less content-based publish/subscribe system. By using Identity based encryption, confidentiality and authentication of publisher and subscriber can be ensured.
Keywords: Publish/Subscribe, confidentiality, broker-less, multi-credential routing, Identity - Based Encryption
Edition: Volume 4 Issue 1, January 2015,
Pages: 585 - 587
Similar Articles with Keyword 'confidentiality'
Downloads: 100
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1709 - 1712A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System
Nara Venkata Surendra Reddy | DLS Reddy [2]
Downloads: 101
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D | Revathi.M [3]