A Review of Secure Pub Sub System
DOI:
https://doi.org/10.51983/ajes-2014.3.2.1921Keywords:
Content-based, publish subscribe, peer to peer, security, identity-based encryptionAbstract
In content-based publish subscribe system authentication and confidentiality are most challenging security issues. This paper presents a novel way to provide confidentiality and authentications in a broker-less contentbased publish subscribe system. The authentication of publishers and subscribers is done using pairing based cryptography. Confidentiality of events is also ensured, by adapting the pairing-based cryptography mechanisms. This paper contributes; secure communication between publisher and subscribers. Publisher use public key to encrypt message, publisher send that message along with its unique identity. To successfully decrypt the message; a receiver needs to obtain a private key for its identity from the key server. The overall approach provides fine-grained key management. Published events are routed to their corresponding subscribers. The evaluation of this project provides security respect to 1) authentication and confidentiality of event dissemination. 2) The overall approach provides fine-grained key management. Published events are routed to their relevant subscribers. The evaluation of this project provides security respect to throughput of the proposed cryptographic primitives.
References
M. A. Tariq, B. Koldehofe, and K. Rothermel, "Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption," IEEE Transactions On Parallel And Distributed Systems, vol. 25, no. 2, pp. 472-484, February 2014.
E. Anceaume, M. Gradinariu, A. K. Datta, G. Simon, and A. Virgillito, "A Semantic Overlay for Self-Peer-to-Peer Publish/Subscribe," in Proc. 26th IEEE Int’l Conf. Distributed Computing Systems (ICDCS), 2006.
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," in Proc. IEEE Symp. Security and Privacy, 2007.
M. Srivatsa, L. Liu, and A. Iyengar, "EventGuard: A System Architecture for Securing Publish-Subscribe Networks," ACM Trans. Computer Systems, vol. 29, article 10, 2011.
J. Bacon, D. M. Eyers, J. Singh, and P. R. Pietzuch, "Access Control in Publish/Subscribe Systems," in Proc. Second ACM Int’l Conf. Distributed Event-Based Systems (DEBS), 2008.
A. Shikfa, M. O¨nen, and R. Molva, "Privacy-Preserving Content-Based Publish/Subscribe Networks," in Proc. Emerging Challenges for Security, Privacy and Trust, 2009.
M. A. Tariq, B. Koldehofe, G. G. Koch, I. Khan, and K. Rothermel, "Meeting Subscriber-Defined QoS Constraints in Publish/Subscribe Systems," Concurrency and Computation: Practice and Experience, vol. 23, pp. 2140-2153, 2011.
A. Burak and B. Bhargava, "SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems," IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 1, Jan/Feb 2013.
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data," in Proc. ACM 13th Conf. Computer and Comm. Security (CCS), 2006.
D. Boneh and M. K. Franklin, "Identity-Based Encryption from the Weil Pairing," in Proc. Int’l Cryptology Conf. Advances in Cryptology, 2001.
Voltage Security, "Identity-Based Encryption," [Online]. Available: http://www.voltage.com/technology/identity-based-encryption.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.