A Review of Secure Pub Sub System

Authors

  • Padmavati N. Kshirsagar PG Student, Institute of Knowledge College of Engineering, Pimple Jagtap, Pune, Maharastra, India
  • S. Pratap singh Asst.Prof. Institute of Knowledge College of engineering, Pune. Maharastra, India
  • Milindkumar V. Sarode Jawaharalal Darda Institute of engineering & Technology, yavatmal, Maharastra, India

DOI:

https://doi.org/10.51983/ajes-2014.3.2.1921

Keywords:

Content-based, publish subscribe, peer to peer, security, identity-based encryption

Abstract

In content-based publish subscribe system authentication and confidentiality are most challenging security issues. This paper presents a novel way to provide confidentiality and authentications in a broker-less contentbased publish subscribe system. The authentication of publishers and subscribers is done using pairing based cryptography. Confidentiality of events is also ensured, by adapting the pairing-based cryptography mechanisms. This paper contributes; secure communication between publisher and subscribers. Publisher use public key to encrypt message, publisher send that message along with its unique identity. To successfully decrypt the message; a receiver needs to obtain a private key for its identity from the key server. The overall approach provides fine-grained key management. Published events are routed to their corresponding subscribers. The evaluation of this project provides security respect to 1) authentication and confidentiality of event dissemination. 2) The overall approach provides fine-grained key management. Published events are routed to their relevant subscribers. The evaluation of this project provides security respect to throughput of the proposed cryptographic primitives.

References

Muhammad Adnan Tariq, Boris Koldehofe, and Kurt Rothermel, “Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption”, IEEE Transactions On Parallel And Distributed Systems, VOL. 25, NO. 2, FEBRUARY 2014

E. Anceaume, M. Gradinariu, A.K. Datta, G. Simon, and A.Virgillito, “A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe,” Proc. 26th IEEE Int’l Conf. Distributed Computing Systems (ICDCS), 2006

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, 2007.

M. Srivatsa, L. Liu, and A. Iyengar, “EventGuard: A System Architecture for Securing Publish-Subscribe Networks,” ACM Trans. Computer Systems, vol. 29, article 10, 2011.

J. Bacon, D.M. Eyers, J. Singh, and P.R. Pietzuch, “Access Control in Publish/Subscribe Systems,” Proc. Second ACM Int’l Conf. Distributed Event-Based Systems (DEBS), 2008.

A. Shikfa, M. O ¨ nen, and R. Molva, “Privacy-Preserving Content-Based Publish/Subscribe Networks,” Proc. Emerging Challenges for Security, Privacy and Trust, 2009.

M.A. Tariq, B. Koldehofe, G.G. Koch, I. Khan, and K. Rothermel, “Meeting Subscriber-Defined QoS Constraints in Publish/Subscribe Systems,” Concurrency and Computation: Practice and Experience, vol. 23, pp. 2140-2153, 2011.

Ahmet Burak and Bharat Bhargava,” SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems”, IEEE transactions on dependable and secure computing, vol. 10, no1, Jan/Feb 2013.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,”Proc. ACM 13th Conf. Computer and Comm. Security (CCS), 2006

D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int’l Cryptology Conf. Advances in Cryptology, 2001.

http://www.voltage.com/technology/identity-based-encryption

Downloads

Published

05-11-2014

How to Cite

Kshirsagar, P. N., Pratap singh, S., & Sarode, M. V. . (2014). A Review of Secure Pub Sub System. Asian Journal of Electrical Sciences, 3(2), 56–59. https://doi.org/10.51983/ajes-2014.3.2.1921