Downloads: 133 | Views: 267
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.7 / 10
Secured Brokerless Identity-Based Publisher Subscriber System
Sayaram N. Shingote, Prof. Syed Akhter
Abstract: The most challenging task is to provide basic security mechanism as authentication and confidentiality in any system. Publisher is one who publish the document and subscriber is a authenticated user who use access that publisher provided documents. Authentication of both publisher and subscriber is one of the difficult task to achieve due to the loose coupling between publisher and subscriber. Similarly confidentiality of event and subscription conflicts with existing system. My paper presents a new method to provide confidentiality and authentication in a broker-less content-based publish/subscribe system by introducing identity based encryption Technique. The authentication of publisher and subscriber as well as confidentiality of events is ensured, by adapting the public and private key cryptography mechanisms, to the needs of a publish/subscribe system. Also algorithm to cluster subscriber based on their subscription preserves a weak notion of subscription confidentiality. This paper also contributes1) use of search encryption to enable efficient routing of encrypted event, 2) multi-credential routing a new event dissemination strategy make strong to the weak subscription confidentiality, and 3) thorough analysis of different attacks by hackers on subscription confidentiality. The proposed approach provides fine grained key management and the less cost for encrypt, decrypt, and routing is in the order of subscribed attribute. The evaluations show that providing security is affordable with respective to1) throughput of the proposed cryptographic primitive, and 2) delay occurred during the construction of the publish-subscribe overlay and the event dissemination. The proposed approach is highly scalable in terms of increasing number of subscribers and publishers in the system and the number of keys maintained by both of them.
Keywords: publish/subscribe, Content-based, peer-to-peer, security, broker-less, identity-based encryption
Edition: Volume 4 Issue 7, July 2015
Pages: 580 - 583
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 625 - 633Ridesharing DApps - A Study on Peer-to-Peer Ridesharing on Ethereum
Tushar S Menon, Aviral Srivastava, Aditya, Dr. Radhika K R
Downloads: 106
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1006 - 1010Description of Communities Based on Peer to Peer Systems and Suggestion for Traffic Localization with ISP
K. Hemapriya, M. Narayanan
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1977 - 1984Chord4TSD: A Decentralized Trust Based Service Discovery Approach on Peer-to-Peer Networks
Yogini Bhamare
Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1459 - 1461Using Peer to Peer Approach of Distributed Systems to Design a Chat Room Application
Kennevor D.G. Kharsyntiew
Downloads: 107
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2839 - 2841Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing
Sagar S. Sanghavi, Rajesh A. Auti