A Survey on Encryption Methods for Providing Security in Pub/Sub System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 135 | Views: 309

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.4 / 10


     

A Survey on Encryption Methods for Providing Security in Pub/Sub System

Onkar P. Kasarlewar, P. S. Desai


Abstract: Internet has changed the world of distributed computing significantly. Peer-to-peer communication mechanism making system more rigid and static applications in distributed system, making a way to loosely coupled infrastructure. This can be achieved by Publish/Subscribe system. As it has group of large unpredictable subscribers, developing a reliable Publish/Subscribe System is challenging task to perform. Many-to-many communications and loosely coupling of publishers, subscribers is strength of Publish/Subscribe. It has huge demand. Because of this, security issue arises. For that, mechanisms like The cost for encryption-decryption, fine grained key management and the pairing-based cryptography mechanisms, and routing is in the order of subscribed attributes are already implemented. Broker-less content-based publish/subscribe system do not tackle the problem of confidentiality at all. So to that, there is scope for providing confidentiality and authenticities in a broker-less content-based publish/subscribe system. By using Identity based encryption, confidentiality and authentication of publisher and subscriber can be ensured.


Keywords: Publish/Subscribe, confidentiality, broker-less, multi-credential routing, Identity - Based Encryption


Edition: Volume 4 Issue 1, January 2015


Pages: 585 - 587



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Onkar P. Kasarlewar, P. S. Desai, "A Survey on Encryption Methods for Providing Security in Pub/Sub System", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 585-587, https://www.ijsr.net/getabstract.php?paperid=SUB15173, DOI: https://www.doi.org/10.21275/SUB15173

Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1349 - 1363

IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing

Ponnarasan Krishnan

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey

Share this Article

Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 3, March 2024

Pages: 422 - 426

Enhancing Cybersecurity in Cloud - Based Banking - Best Practices and Technologies

Ravi Jagadish

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article
Top