International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122 | Views: 225

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 7.2 / 10


     

Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems

S. N. Shitole, A D Gujar


Abstract: In past few years, Web has huge impact on distributed computing. The provisioning of fundamental security mechanisms like authentication and confidentiality for Sender/Receiver System is exceptionally difficult. Authentication of Senders and Receivers is hard to accomplish because of the loosely coupling of Senders and Receivers. Moreover, privacy of events and subscriptions conflicts with content based routing. This paper displays a novel methodology to provide confidentiality and authentication in Sender/Receiver System. By adapting pairing-based cryptography mechanisms, the authentication of Senders and Receivers and additionally confidentiality of events is guaranteed, to the needs of a Sender/Receiver system. Besides, an algorithm to cluster Receivers as respective of their subscriptions protects a weak notion of subscription privacy. There can be some improvements which can be doneto the existing systems [8]. Like 1) utilization of searchable encryption for allowing proficient routing of encrypted events, 2) Exhaustive examination of number of attacks on subscription confidentiality, and 3) Multicredential routing another event dissemination technique to reinforce the weak subscription confidentiality. The general methodology offers fine-grained key management and the expense for encryption, decryption, and routing is in the request of subscribed properties. In addition, the assessments demonstrate that providing security is reasonable with respect to 1) delay brought about amid the development of the Sender/Receiver overlay and the event dissemination, 2) Throughput of the presented cryptographic primitives.


Keywords: Loosely coupling, Sender/Receiver system, Peer to Peer, Identity - Based Encryption, Multicredential routing


Edition: Volume 4 Issue 1, January 2015


Pages: 1783 - 1785



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
S. N. Shitole, A D Gujar, "Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 1783-1785, https://www.ijsr.net/getabstract.php?paperid=SUB15392, DOI: https://www.doi.org/10.21275/SUB15392



Similar Articles

Downloads: 98

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1380 - 1385

Selecting Effectual Peers in P2P Webs for Task Calculating

Rajalakshmi.V, Gayathri, Swathi Durga, M. Narayanan

Share this Article

Downloads: 106

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1006 - 1010

Description of Communities Based on Peer to Peer Systems and Suggestion for Traffic Localization with ISP

K. Hemapriya, M. Narayanan

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1459 - 1461

Using Peer to Peer Approach of Distributed Systems to Design a Chat Room Application

Kennevor D.G. Kharsyntiew

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2762 - 2766

Large Scale Data Shared by Peer to Peer Based System in Shared Network

Bhavsar Harshada V., Dr. S. V. Gumaste, Prof. Deokate Gajanan S.

Share this Article
Top