Submit Search
Upload
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encryption
•
0 likes
•
24 views
IRJET Journal
Follow
https://www.irjet.net/archives/V4/i3/IRJET-V4I3578.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Shakas Technologies
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Adz91 Digital Ads Pvt Ltd
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
LeMeniz Infotech
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
IJLT EMAS
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
IEEEMEMTECHSTUDENTPROJECTS
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET Journal
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
IJECEIAES
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
Recommended
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Shakas Technologies
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Adz91 Digital Ads Pvt Ltd
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
LeMeniz Infotech
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
IJLT EMAS
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
IEEEMEMTECHSTUDENTPROJECTS
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET Journal
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
IJECEIAES
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Cláudia Alves
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
Invincea, Inc.
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
Security issues in grid computing
Security issues in grid computing
ijcsa
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computing
ijsptm
Secure Multi Authority Data Access Control System in Cloud Computing
Secure Multi Authority Data Access Control System in Cloud Computing
IRJET Journal
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
IEEEFINALYEARPROJECTS
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
IJERA Editor
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Shakas Technologies
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
LeMeniz Infotech
Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014
Michael Bunn
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
Alexander Decker
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Pvrtechnologies Nellore
Privacy preserving secure data exchange in mobile p2 p
Privacy preserving secure data exchange in mobile p2 p
www.pixelsolutionbd.com
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
IJNSA Journal
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
More Related Content
What's hot
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Cláudia Alves
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
Invincea, Inc.
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
Security issues in grid computing
Security issues in grid computing
ijcsa
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computing
ijsptm
Secure Multi Authority Data Access Control System in Cloud Computing
Secure Multi Authority Data Access Control System in Cloud Computing
IRJET Journal
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
IEEEFINALYEARPROJECTS
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
IJERA Editor
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Shakas Technologies
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
LeMeniz Infotech
Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014
Michael Bunn
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
Alexander Decker
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Pvrtechnologies Nellore
Privacy preserving secure data exchange in mobile p2 p
Privacy preserving secure data exchange in mobile p2 p
www.pixelsolutionbd.com
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
IJNSA Journal
What's hot
(19)
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Security issues in grid computing
Security issues in grid computing
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computing
Secure Multi Authority Data Access Control System in Cloud Computing
Secure Multi Authority Data Access Control System in Cloud Computing
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Privacy preserving secure data exchange in mobile p2 p
Privacy preserving secure data exchange in mobile p2 p
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
Similar to Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encryption
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through Blockchain
IRJET Journal
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
IEEEFINALYEARSTUDENTPROJECT
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
IEEEGLOBALSOFTSTUDENTSPROJECTS
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
IRJET Journal
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET Journal
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
710201940
710201940
IJRAT
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET Journal
Similar to Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encryption
(20)
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through Blockchain
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
710201940
710201940
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Recently uploaded
(20)
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
power system scada applications and uses
power system scada applications and uses
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encryption
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2211 SECURING LIAISON-LESS PUBLISHER/SUBSCRIBER SYSTEMS USING IDENTITY BASED ENCRYPTION S.Kranthi1, Madhavi Nalluri2, Tejaswi Nadakuditi3, Y.Shekinah4, S.Mahesh5 1Assistant Professor, Department of Information Technology, VRSEC, Vijayawada, India 2,3,4,5 V.R Siddhartha Engineering College, Department of Information Technology, Vijayawada, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The provisioning of fundamental security components, for example, authenticationandconfidentialityis extremely challenging in a content based publish/subscribe framework. Verification of publishers and subscribers is hard to accomplish because of the free coupling of publishers and subscribers. Moreover, confidentiality of events and subscriptions clashes with content based routing. This paper displays a novel approach to deal with confidentiality and authentication in a liaison less content based publish/subscribe system. The verification of publishers and subscribers and secrecy of events is guaranteed, by adapting the pairing based cryptographymechanisms, tothenecessities of a publish/subscribe system. Moreover, an algorithm to bunch subscribers as indicated by their subscriptions protects a weak notion of subscription confidentiality. Moreovertoour past work this paper contributes 1) utilization of searchable encryption to enable effective directing of encryptedevents, 2) multicredential steering another event distribution methodology to reinforce the weak subscription confidentiality, and 3) careful examination of various attacks on subscription confidentiality. General approach gives fine- grained key management and the cost for encryption, decryption, and routing is in the arrangement of subscribed attributes. Also, the assessments demonstrate that giving security is moderate w.r.t. 1) output of the suggested cryptographic primitives, and 2)delayscausedthroughout the development of the publish/subscribe overlay and the event distribution. Key Words: Security /subscribe mechanisms, Publish system, Authentication, Confidentiality. 1. INTRODUCTION The publish/subscribe model developed from last few years as an effective devicefordistributedapplications in which information must be scattered from event producers to event consumers i.e. from publishers to subscribers. Clients get certain sorts of occasions by applying channels on event contents called subscription. For each new event published the Pub/sub framework checks all events close to every present subscriptions and convey it to all clients for their coordinated subscription. Conventionally they were utilizing dealer networks for event routing from publishers to subscribers. In laterframeworks,liaison- less routing infrastructure is utilized by making event forwarding overlay. [1] In content based public subscribe systems data concerning an event (i.e. content of message) figures out where the message is conveyed. Senders send messageswithoutknowingaddressofdestination,with just some message noticeable to network. Receivers proclaim a query which is coordinated against published message. At that point the message is transmitted to all receivers whose question is coordinated by the content of the message. This strategyisvaluableforvariousdistributedapplications like stock trade, movement control, publish detecting. Pub/Sub frameworks need to give security to these applications such access control and confidentiality. The access control in pub/sub framework means only authenticated publishers are permitted to distribute events and just approved subscribers are permitted to get those events. Content of events are kept as secret and subscribers get that events without illuminating theirsubscriptionsfortheframework.Bothpublication andsubscriptionconfidentialityisrequiredtodecrease risk of spillage of events in systems. For that reason publisher and subscriber need to share private key, by utilizing public key foundation, which is definitely not desirable that it would debilitate the decoupling property of the model. In PKI, public keys of all subscribers are maintained by publishers for encryption of events. Correspondingly, to check authenticity of received events the subscribers must know the public keys. Conventional strategies for encrypting all message disregards the approach of content based framework. Consequently new technique is expected to route events to subscribers without knowing their subscriptions and authenticating them. Public subscribe frameworks are given by most researchers yet less consideration is given on security of public subscribe frameworks. Existing methodology relies on traditional liaison network. This either
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2212 manages security under constrained perspicuity, for example, by utilizing just keyword coordinating for routing events [2], [3] or relies upon semi-trusted merchant network [4] [5] [6]. In keyword search technique, events are routed in view of keyword in the message contents. This approach provides key administration yet does not give access control in adaptable way. However, in security issues of public subscribe frameworks how the subscribers are clustered is not specified. In this paper we exhibit new way to provide authentication and confidentiality in public subscribe frameworks. The credentials are kept up in view of subscriptions of subscribers. We require keys to encrypt the event; private keys dispensed to the subscribers are named with credentials. There are set of credentials for publisher. The public key can be any arbitrary string in public key encryption.Insuchaplan there are four stages. In first setup stage, worldwide system parameters and a master key are created. In second, i.e. extraction, private keys are removed from master keys. In third, encryption, by using public keys the events is encrypted. In fourth, decryption, by using relative private keys the messages is decrypted. [7] We build up an identity based encryption in which, if there is match amongst credentials and key then only the relative subscribers can decrypt event. Likewise it permits subscribers to check authenticity of received events. [8] In addition we handle issueswithrespectto subscription confidentiality for semantic clustering of events. A secure overlay maintenance protocol is intended to save the weaksubscriptionconfidentiality. 2. LITERATURE SURVEY: W.C. Barker discussed about the“Recommendationfor the Triple Data Encryption Algorithm (TDEA) Block Cipher" [9] in the year 2012: TDEA is framed obtainable to be utilized by Federal organizations within the context of an entire security program comprising of physical security methodologyandgood data administration practices. TDEA could also be utilized by Federal associations to protect sensitive unclassifiedinformation.Tokeepuptheconfidentiality there is a need to protect information throughout transmission or in storage. A.Sahai,J. Bettencourt, B. Waters explained about “Cipher text-Policy Attribute-Based Encryption" [8] in the year 2007: they have proposed a framework called as Cipher content Policy Attribute-Based Encryption for the unpredictable access control system on encrypted information. This method is utilized to keep the encrypted information secret in a situation where the capacity server is not secured. In the current Attribute-Based Encryptionframeworksattributesare used to describe the encrypted information and furthermore characterize the strategies into client’s keys.Inthisproposedframeworkclient’squalifications are described by the attributes and an approach is controlled by the party that is encrypting the information for who can decode the encrypted information. M.A. Tariq, B.Koldehofe, A.Altaweel, and K.Rothermel explained about “Providing basicsecuritymechanisms in broker-less publish/subscribe systems" [10] in the year 2010. This paper shows a novel way to provide confidentiality and authentication in a liaison-less content-based publish/subscribe framework. By adjusting thepairing-basedcryptographycomponents, the authentication of publishers and subscribers as well as confidentiality of events is ensured, to the necessities of a distribute/subscribe framework. Furthermore, it is an algorithm we used for clustering subscribersaccordingtotheirsubscriptionssafeguards a weak idea of subscription confidentiality. Our approach gives finegrainedkeyadministrationandthe cost for encryption, decryption and routing is in the request of subscribed attributes. A. Content Based Publisher /Subscriber (CBPS): Content based data model is used for routing the events from publishers to the relevant subscribers. Consider publisher/subscriberinasettingwherethere exists no committed liaison infrastructure. Publishers and subscribers contribute as associates to theupkeep of a self-organizing overlay structure. To authenticate publishers, we use the idea of advertisements inwhich a publisher reports beforehand the arrangement of events which it expects to publish [4]. B. Identity-Based Cryptography: Adi Shamir, proposed another sort of open key calculation in1984. While public key frameworks have the innate issue of appropriating public keys and binds those public keys to a particular receiver, Shamir proposed mathematicallycreatingtherecipient'spublickeyfrom his or her identity, then having the key servercompute the required private key. This framework is called an
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2213 Identity-Based Encryption (IBE) algorithm [11]. In the IBE scheme, the sender Alice can utilize the receiver's identifier data which is represented by any string, for example, email or IP address; to encode a message [12].This approach would expel the requirement for public key queries or certificates. C. Identity Based Encryption: In this paper, publishers and subscribers associatewithakeyserver. They supply credentials to the key server and in turn get keys which fit the proclaimed capacities in the credentials. Afterwards, those keys can be used for encrypting, decrypting, and signing appropriate messages in the content based publisher subscriber system, i.e., the credential becomes approved by the key server. The keys are appointed to publishers and subscribers, and the cipher texts are marked with credentials. Generally, the identity-based encryption guarantees that a specific key can decrypt a specific cipher text only if there is a match betweenthekeyand credentials of the cipher text. Publishers and subscribers keep up discrete private keys for each authorized credential. Identity-Based Encryption (IBE) significantly simplifies the way of securing sensitive communications. Following example shows how Alice would send a protected email to Bob using IBE: There are two users initial one is Alice and second one is Bob. Alice encrypts messages and sends those messages to Bob along with her identity.Bob requests server for private key. Server allocates private key to Bob. Bob uses his private key to decrypt the received message. 3. SCOPE: The pub/sub overlay proposed is like DPS systemwith alterations to confirm subscription confidentiality. In this paper,weassessperformanceandscalabilityofthe proposed pub/sub system only with respect to the security mechanisms and discard different aspects. Specifically, we assess the performance of our system the overlay construction time and the event dispersal delays. We measure the average delay experienced by every subscriber of interface with an appropriate position in an attribute tree. Delay is computed from the time a subscriber forwards connection request message to a arbitrary peer in the tree till the time the connectionisactuallyestablished.Theassessmentsare performed just for a solitary attribute tree. It demonstrates that the averageconnectiontime(delay) increments with the amount of peers in the system because of the expansion in the height of the attribute tree (each new hop builds the network delay as well as time to apply security techniques). 4. PROPOSED SYSTEM: Proposed System exhibits another way to give authentication and confidentiality in a liaison less pub/sub system. Our approach permits subscribers to keep up credentials as per their subscriptions. Private keys allotted to the subscribers are marked with the credentials. A publisherconnectseachencryptedevent with a set of credentials. We accommodated identity based encryption (IBE) approaches 1) to guarantee that a specific subscriber can decrypt an event just if there is a match between the credentials related with the event and the key; and 2) to permit subscribers to validate the authenticationofacceptedevents.Besides, we address the issue of subscription confidentiality within the sightofsemanticclusteringofsubscribers.A weaker notion of subscription confidentiality is characterized and a secure overlay maintenance protocol is intended to safeguard the weak subscription confidentiality. A. PROBLEM DEFINITION: It incorporates two entities in the system: publishers and subscribers. Both the entities are computationally bounded and don't trust each other. Also, every one of theparticipantpeers(publishersorsubscribers)taking an interest in the pub/sub overlay system are straightforward and do not diverge from the planned protocols. In like manner, only authorized publishers propagate valid events in the system. Although, malicious publishers may act like the authorized publishers and spam the overlay network with fake and replicate events. We do not intend to resolve the digital copyright issue; consequently, authorized subscribers do not uncover the content of effectively decrypted events to different subscribers. B. SYSTEM WORKFLOW AND ARCHITECTURE: The traditional cryptosystems utilizes same keys for encryption and decryption. Both keys are kept will be kept secret. The issues of this conventional cryptosystems were distribution of keys and key administration. A paradigm is moved towards public key cryptosystem. In which diverse keys are utilized for encryption and decryption. One key is public and other is private. These plans also have some operational issues. For administration of keys Public key foundation is maintained. But conventional PKI needs to keep up huge number of keys. IBE gives other
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2214 option to decrease amount of keys to store. We use private key generator as trusted third party and also called as key server. Toward the begin first PKG produces pair of keys, public keys and private keys. The public key is accessible to clients. We call these keys as master public and private keys. Figure 1: System Workflow The figure 1 has been explained in following steps: 1) First sender, Alice makes plaintext message for receiver bob and we send this message from sender to receiver as shown in figure 1. To encrypt message, Alice uses few credentials that includes Bob's identity and cipher text is encrypted. 2) Bob receives cipher text from Alice, along with that some plain text information is also sent while transmission. The information which is transmitted is used for getting private key from PKG to decrypt message. Bob also required validating with PKG by sending credentials such as Identity of Bob. After that PKG transmits Bob’s private key over a protected channel. 3) For example, E-mail address is used as public key. 4) Bob uses his private key to decrypt cipher text to recover the plaintext message. 5) As PKG keeps up single Master public keys and Master Private Keys, so it can be utilized as smart card. A pairing based cryptography is utilized for execution of IBE. A mapping is built up between to cryptographic groups by means for bilinear maps. 5. CONCLUSION: In this research paper, we have presented a modern technique to obtain authentication and confidentiality in a liaison-less content based publisher/subscriber system. The technique is most adaptable in respect of number of subscribers, publishers and the amount of kept up by them. Specifically, we have enlarged operations to relegate credentials to publishers and subscribers based on their subscriptions and advertisements. Private keys which are allocated to publishers, subscribers and cipher texts are labeled with credentials.Weusedmethodsfromidentitybased encryption i.e. 1)To guarantee that a specific subscribers can decrypt an event only if they have same credentials linked with the event and its private keys.2)To permit subscribers to confirm the authenticity of received events. Besides, we built up a secure overlay maintenance protocol and suggested two event distribution techniques to protect the weak subscription confidentiality within the sight of semantic clustering of subscribers. The evaluations show the practicality of the proposed securitysystems and examine attacks on subscription confidentiality. 5. RESULTS AND OBSERVATIONS: Figure 2: Publisher Screen In figure 2 we see a publisher screen where we generate and get keys by giving the system ip address and if there match i.e system ip address is same then it will generate keys after that we browse,upload the required file that is the file which publisher want to publish and he choose the deired network. Figure 3: key server
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2215 After selecting the desired network before publishing, the keys are sent to Data Center through router and key server for verification as shown in figure 3. If the keys are not attacked then the keys are in safe state else in not safe state. Figure 4: Router screen After verification process the uploaded file will be transmitted for the relevant subscribers as shown in figure 4. Figure 5: Subscriber screen In figure 5 we can see the subscriberwherethepublish data has been received to the subscriber without any modifications. In figure 6 we see the attacker attacks the publisher using publisher private key. Figure 6: Attacker screen After attacking there shouldbeamessage“keysarenot safe” in the key server which is shown in figure 7. Figure 7: Key server after attacking Figure 8: keys updated by backup We can see the keys are not safe in figure 7.In identity based encryption the keys which have been attacked will be updated usingbackup which we can see in figure 8.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2216 REFERENCES [1] E. Anceaume, M. Gradinariu, A.K. Datta, G. Simon, and A. Virgillito, “ASemantic OverlayforSelf-Peer- to-Peer Publish/Subscribe,” Proc. 26th IEEE Int’l Conf. Distributed Computing Systems (ICDCS), 2006. [2] Antonio Carzaniga, Michele Papalini, Alexander L. Wolf “Content-Based Publish/Subscribe Networking and Information-CentricNetworking”. [3] M. Srivastava, L. Liu, and A. Iyengar, “Event Guard: A System Architecture for Securing Publish- Subscribe Networks,” ACM Trans. Computer Systems, vol. 29, article 10, 2011. [4] A. Shikfa, M. O nen, and R. Molva, “Privacy- Preserving Content-Based Publish/Subscribe Networks,” Proc. EmergingChallengesforSecurity, Privacy and Trust, 2009. [5] H. Khurana, “Scalable Security and Accounting Services for Content-Based Publish/Subscribe Systems,” Proc. ACM Symp. Applied Computing, 2005. [6] L. Opyrchal and A. Prakash, “Secure Distribution of Events in Content-Based Publish Subscribe Systems,” Proc. 10th Conf. USENIX Security Symp., 2001. [7] D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int’l Cryptology Conf. Advances in Cryptology, 2001. [8] J. Bethencourt, A. Sahai, and B. Waters, “Cipher text-PolicyAttribute-BasedEncryption,”Proc.IEEE Symp. Security and Privacy, 2007. [9] W.C. Barker and E.B. Barker, SP 800-67 Rev. 1. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, technical report, Natl Inst. of Standards & Technology, 2012. [10] M.A. Tariq, B. Koldehofe, A. Altaweel, and K. Rothermel,ProvidingBasicSecurityMechanismsin Broker-Less Publish/ Subscribe Systems, Proc. ACM Fourth Intl Conf. Distributed Event- Based Systems (DEBS),2010. [11] A. Shamir, “Identity-Based cryptosystems and signature schemes”, “CRYPTO”, Springer, 1984. [12] Joonsang Baek1 JanNewmarch2,ReihanehSafavi- Naini1, and WillySusilo1 “A Survey of Identity- Based Cryptography”.
Download now