Downloads: 135 | Views: 309
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.4 / 10
A Survey on Encryption Methods for Providing Security in Pub/Sub System
Onkar P. Kasarlewar, P. S. Desai
Abstract: Internet has changed the world of distributed computing significantly. Peer-to-peer communication mechanism making system more rigid and static applications in distributed system, making a way to loosely coupled infrastructure. This can be achieved by Publish/Subscribe system. As it has group of large unpredictable subscribers, developing a reliable Publish/Subscribe System is challenging task to perform. Many-to-many communications and loosely coupling of publishers, subscribers is strength of Publish/Subscribe. It has huge demand. Because of this, security issue arises. For that, mechanisms like The cost for encryption-decryption, fine grained key management and the pairing-based cryptography mechanisms, and routing is in the order of subscribed attributes are already implemented. Broker-less content-based publish/subscribe system do not tackle the problem of confidentiality at all. So to that, there is scope for providing confidentiality and authenticities in a broker-less content-based publish/subscribe system. By using Identity based encryption, confidentiality and authentication of publisher and subscriber can be ensured.
Keywords: Publish/Subscribe, confidentiality, broker-less, multi-credential routing, Identity - Based Encryption
Edition: Volume 4 Issue 1, January 2015
Pages: 585 - 587
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1075 - 1080Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques
Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1349 - 1363IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing
Ponnarasan Krishnan
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 3, March 2024
Pages: 422 - 426Enhancing Cybersecurity in Cloud - Based Banking - Best Practices and Technologies
Ravi Jagadish
Downloads: 100
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1709 - 1712A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System
Nara Venkata Surendra Reddy, DLS Reddy