SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1650
Design of Anonymous Publish-Subscribe Messaging System in a P2P
Network Architecture
Sushil Paneru1, Dr. R. PADMAVATHY2
1.2Department of Computer Science and Engineering, NIT Warangal
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Publish-subscribe is a popular asynchronous
message exchange pattern that is widely used in distributed
systems. Apache Kafka, RabbitMQ are some of the widely used
centralized implementation of publish-subscribe message
exchange system, which provides scalable and robust
messaging service to connect various distributed services.
Decoupling of publisher and subscriber is the nuance of
publish-subscribe messaging pattern, but the aforementioned
centralized implementations does not provide anonymity to
publishers and subscribers i.e. an intruder having access to
broker – the central entity — can find out the identity of
publishers and subscribers. Thus, we present a design that
masks the identity (IP address) of actors with virtual
addressing — just as systemslike Bitcoinand decentralizes the
broker by relying on P2P network architecture to avoid single
point of failure along with provision of load distribution for
message routing. Our proposed design trades off low latency
with anonymity, which is conducive to buildingananonymous
publish subscribe messaging system that ensures concealed
identity of users along with data confidentiality and data
integrity. Application of such anonymous system would be to
construct a communication channel, whereinusercancontact
each other and exchange data while protectingtheiridentities
from each other and from outside parties, also such model
would further allow governments to take part in covert
operations or news agencies to obtain sensitive and ground
breaking information secretly from a source.
Key Words: Peer To Peer, publish subscribe, anonymity,
decentralization, virtual address routing, bloom filter
1. INTRODUCTION
With the shift in paradigm from centralized to decentralized
systems in recent years, there arose a need for robust,
simple and asynchronous way to exchange messages
between the distributed services. Point to point messaging
between services using HTTP/UPD/TCP turned out to be
difficult with increase in the number of services as
tremendous amount of effort was required to maintain an
effective and simple communication betweensystems.Thus,
in the process of easing out hurdlesinvolvedduringmessage
exchange in a distributed system,systemdesignersoptedfor
publish-subscribepatternwhereanexternal agentsimplifies
the complexity in communication and makes the task of
building a distributedapplicationeasier.Publish-subscribeis
an asynchronous message exchange patternwherea sender,
also called as publisher, does not send the message directly
to the recipient, also termed as subscriber, but instead the
message is sent to an entity called broker which then
forwards the message to all the interestedsubscribers.Thus,
such message exchange pattern introduces broker, an
external agent, which decouples sender from receiver and
enables many to many communication with minimal effort.
Along with benefit offered by pub-subpatternlikeeasing out
the process of message dissemination, it has itsownshare of
security issues like authentication, anonymity of agents,
availability and confidentiality. A pub-sub network without
any encryption scheme can leak out the details of published
data to other peers (no confidentiality); without any
message or peer authentication, the system lacks data and
system integrity. Without anonymity to the peers,therole of
an agent, publisher or subscriber, can also be leaked out.
This paper intends to present a solution to provide
anonymity to the agents along data confidentiality and
integrity.
1.1 Related Works
Most of the existing work in the field of pub-sub network
have focused on scalability, performance;someofthemhave
provided approach for data confidentiality andintegrityand
very few have talked about anonymity of the peers. One of
the most popular pub-sub message exchange system is
Scribe [3], which introduced the use of spanning tree
consisting of subscribers for efficient data dissemination.
Scribe depends on the features of Pastry P2P network [4]
which is considered to be scalable but it cannot provide
anonymity to the users. One of the popular work in the field
of pub-sub is by MudhakarSrivatsa,LingLiu [1]whichbuilds
a modular framework for providing confidentiality and
integrity but not anonymity. One of the publish-subscribe
systems that aims to provide anonymity is by Datta et al [5].
They propose a routing system based on maintaining
multiple layers of weakly connected directed acyclic graphs.
In this system, one or more sink nodes, which may change
over time, become dissemination points receiving all
publications and forwarding them to subscribers. However,
anonymity is provided by assuming that the node from
which a receiver gets a message may not be the original
publisher. However, an adversary would still know that that
node could possibly be an original publisher. Without
probabilistic analysis of this possibility, it is difficult to say
how well protected the publishers actually are. Also, no
mention is made as to how difficult it is to identify
subscribers in the system, and this has not been
implemented. The other publish subscribe system is the
work by Binh Vo and Steven M. Bellovin [6]. They propose
the use of Tor hidden service [7] as an anonymous network
which will handle the work of hiding the true identity of
users and route messages by constructing spanning tree for
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1651
each topic among the peers. The approach to use Tor hidden
service is quite slow and expensive because it includes
maintaining relaynodesfortorandmulti-layeredencryption
and decryption whereas there is single layered encryption
and no involvement of relay nodes in our system and also it
is to be noted we use virtual address routingforhidingpeers
identity instead of Tor hidden service. Also, many attacks
have been successfully made on Tor network andithasbeen
broken by many systems in the past
1.2 Objective
This paper aims to provide a set of designs that anonymizes
the network along ensuring with data confidentiality and
integrity. When we mention anonymity, we mean about
hiding the IP address of the peer since the sole identity of a
user on internet is its IP address. Just like in bitcoin, an
anonymous system, virtual addressing is introduced to
mask the real identity of the user; all communication is
performed by addressing the packets to virtual address of
the receiver peer. With the use of virtual address, there
comes a need to route the packets on the basis of virtual
address; therefore, we propose a routing protocol,whichisa
variant of distance vector routing algorithm that trades off
speed of packet transmission with anonymity. We also use a
centralized service coordinator that helps bootstrap the
network and intelligibly implements key management
without jeopardizing the anonymity property of the
network. A pub-sub network can be content based or topic
based, but in this paper we focus on topic based network for
simplicity.
2. PRELIMINARIES
2.1 Characteristics of P2P Network
The underlying P2P network on which we pass messages is
unstructured, very much like Bittorrent and Naspster. A
central service coordinator is usedtotrack theglobal viewof
the P2P network and helps new peers join the network. The
central service coordinator ensures the degree of
connectivity of peers i.e. a peer is connected to how many
other peers; the reason behind this strategy is to nullify the
effects of peer churning, which can debilitate the network.
Even though the central service is compromised, the
anonymity of the network won’t be at stake since the
coordinator does not contain any data about the mapping of
virtual address and the IP address of the peers. The service
coordinator also tracks the availability of the peers via
sending heartbeat — a basic UDP packet — to the peers and
waits for the response to check if the peer is alive or not.
Also, the underlying message transport protocol is UDP
which offers the advantage of spoofingthesenderfieldof the
packet.
2.1 Context of Anonymity
The main crux of this work is introducing anonymity. To
start, anonymity in our context should be defined. In this
paper, anonymity refers to the following three situations:
 An eavesdropper (i.e. a middle man) should not be
able to know the identity (IP address) and role of
peers during message exchange (i.e. whether they
are a publisher or a subscriber).
 A forwarder peer (a peer who helps in message
dissemination) should not be able to know about
the content of the messages that it is forwarding to
other peers.
 A publisher should not know the identity of
subscribers. Similarly, subscribersshouldnotknow
about the identity of the publisher.
2.3 Degree of Anonymity
We define two kinds of system, open and closed, based on
the how the peers are allowed to communicate and to what
level of anonymity and other securities are provided.
For an open system, anyone can join the network and a
person can read any other person’s messages. An example of
this would be a civil rights activist wanting to communicate
to the masses in order to protest about Civil Rights Violation
during a state of emergency (e.g. Arab uprising in Lebanon,
Egypt, Syria, etc.), but is afraid that his/her identity will get
leaked. This system will have anonymity and message
authentication but no publisher authentication as without
external authentication any peer can act as publisher
On the other hand in a closed system, only those who have
already obtained a secret key by some external means can
join the network and communicate. For example, a source
wants to leak sensitive informationtoa groupofnewspapers
but want their identity to be concealed during this exchange
of information, and the interested parties should have the
secret key to participate during message exchange. Here, a
closed network is going to be used. Unlike open system,
introduction of an external secret key ensures the
authentication of publisher i.e. the subscribers are ensured
they will receive the message fromthepublisherwhohasthe
secret key. Thus, closed system is supposed to havemessage
authentication, publisher authentication and message
confidentiality.
3. METHODOLOGY
3.1 The Role of Service Coordinator
The service coordinator maintains the global state of the
network; for example, it tracks of the alive nodes (via
receiving heartbeat from nodes) on the network and also
information about to how many other peers a node is
connected to so that it can minimize the risk caused by peer
churning — for example, prevention of formation of
articulation point which can bipartition the network. So,
when a node wishes to join the network, it has to contact
service coordinator which, in response, sends a list of peers
that the new node can connect to. The list of peersisselected
in such a way that after connection, each node in the
network is connected to some minimum number peers so
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1652
that effects of peer churning is minimized. Thus, service
coordinator helps maintain the network to be in a healthy
state.
The service coordinator also act ascertificateauthority(CA).
A peer can register its public key by providing its virtual
address (further explained in section 3.2) and its public key.
The CA accepts such key registration requests(orcanalsobe
called as certificate generation) only whenthehashofpublic
key matches with the virtual address of the node. Non-
collision property of hash functions like SHA-256 ensures
that a bad peer can't fool service coordinator to tamper with
the certificate directory. Similarly, whenevera peerwantsto
get the public key of another peer, it has to query the service
coordinator with the virtual address of the peer whose
public key it wants. The queried certificate will be signed by
the service coordinator whose certificate (signed by some
root CA like Godaddy) will be made available to a peer at the
time of joining the network. Thus, service coordinator also
acts as a trustful entity in the network who can be relied
upon for distribution of public key.
It can be argued that when service coordinator gets
compromised, data can be leak out which can benefit a
attacker to map the virtual address of a peer to its IP
address. Except during peer's certificate registration, a peer
does not have to provide its virtual address to service
coordinator. The solution to this scenario is that, at the time
of certificate registration, a peer spoofs the originfieldofthe
UPD packet — unlike TCP, no handshake is required —
which it sends to the CA. The reason that UDP is used at this
point of contact with service coordinator is to spoof the real
identity to service coordinator, which cannot be done with
TCP since handshake is required. Thus, even if the service
coordinator gets compromised at the time of certificate
registration, the IP address that theattackerobserveswill be
a spoofed one. Hence, the real identity of a peer remains
secret.
But a problem with service coordinator is that it is also a
single point of failure. This can be mitigated by keeping
another service coordinator in stand-by mode for a master
slave configuration, where the slave service coordinator's
state will continuously be updated by the master.
3.2 Virtual Addressing
Usage of IP address in the standard pub-sub model makes it
non-anonymous because messages can be traced easily and
identities of peers can be revealed, unless some proxy or
VPN is used. In fact, even the usage of VPN and proxy can
reveal the identity of the user by accessing the central
service provider, and this is standard procedurefollowed by
government agencies. So, just like in systems like bitcoin, we
introduce the usage of virtual address for addressing peers
instead of IP addresses. Virtual address or nodeId is
basically a hash of public key which the peer chooses for
making its communication with other peersconfidential and
authenticated. Rather than fixing the usage of a particular
hash function, we let the user, as per their choice, choosethe
hash function. This allows the system to evolve with the any
kind of development of hash function in the community of
cryptography. Hence, a nodeId will also contain a short
header, along with the hash digest, that specifies the type of
hash function used and the length of hashdigest.Anexample
is shown below:
[Hash function code][Length of hash digest][Hash digest]
Since we are using virtual address to identify a node, we will
need a way to route the packets in the network. Therefore,
we have come up with a variant of distance vector routing
algorithm, which is the algorithm used by routers to route
the packets over internet. Virtual address routing basically
help determine the sub-optimal path to route the packettoa
destination without revealing identity of the peers involved.
Similar to distance vector routing, each node maintains a
table, as shown below in table 3.1, which has a row for each
destination peer and a column for each of its directly
attached neighbors; with the help of routing table, a node
can only know the direction to destination, butnotthe whole
path. In other words, a node will only know to which
neighbor to send the packet for effective routing. Unlike
distance vector routing, instead of distance, a node stores
timestamp of the packet received from the neighbor which
was sent to that node from sender node; timestampwill help
decide the neighbor (direction) that allows sub-optimal
routing in future. Until the routing table does not have entry
for a destination peer, it can’t determine to which neighbor
forward the packets to. So, packets are sent to all the
neighbors i.e. broadcast until the packet reaches a node
which has the entry for destination, and it can happen that
the packet reaches all the way to destination during the
broadcast. Also, to preclude the flooding of network, a
unique message id (hash of the messagepacket)isgenerated
for each message; so, that the already seen packet’s
circulation can be stopped. This is further explained in
section 3.5. An example is given below to explain how a
node learns to construct routing table from the message
packets being circulated in the network.
Figure –1: Routing among peers, solid line represents
connection between the peers, dotted line represents path
a message was routed through
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1653
Table –1: Routing table of peer X
Destination Neighbor peers (timestamp of message
received)
Peer Z Peer Y Peer W
Peer A (virtual
address)
5 8 -1
In Figure 3.1, let peer X received messages originated from
Peer A through two of its neighbors (Peer Y and Peer Z). Peer
X would then populate its routing tableasshowninTable3.1.
For populating the routing table, timestamp of the event
when the message was received is stored, and -1 if the node
hasn’t ever received a message from a neighbor. Later, at
some point of time, if Peer X receives a message from Peer B,
it checks the destination’sVirtualAddressinsidethemessage
header. If the destination address happens to be Peer A’s
virtual address, Peer X then knows that it could forward the
message to either Peer Z or Peer Y. Peer X then chooses the
one from which it receivedthemessageearliesti.e.entrywith
the least timestamp value, in this case peer Z. So, in Virtual
Address Routing, each peer maintains its routing table by
learning from the packets being routed in the network.
3.2.1 Publish Subscribe Events
When a peer wants to subscribe to a topic, it broadcasts a
subscription request query all over the network and the
corresponding publisher and other subscribers of the same
topic will store the virtual address and in response,
publisher will send a dummy message along with its
signature. Such broadcast is supposed to flood the network,
for which we have come up with a solution, which is
explained in section 3.5. Similarly, when the publisher
intends to publish a message, it disseminates the message
via gossip protocol (explained in section 3.4) along with its
signature; the signature ensures message has not been
tampered. The underlying routing happens as explained in
section 3.2. Also, since the underlying transfer protocol is
UDP, there is no need for exposing the source IP address
unlike TCP, and thus, anonymity is attained by trading off
reliability.
Thus, with virtual address routing, we construct a sub-
optimal path — which no peers knows about — to replace
the need for a centralized broker, and also since every peer
can act as a broker, the task of routing packets is distributed
amongst all the nodes in the network.
.3 Encryption and Authentication
Along with anonymity, we aim to provide message
confidentiality and message authentication. Public Key
Encryption and symmetric key encryption is used for
maintaining message confidentiality and message
authentication so that a forwarder peer (P2P broker), who
happens to be an attacker, won't be able to know content of
the message and the message receiver will be assured of its
source.
In a Closed Network, the secret key, which is obtained from
external sources, will act as the key for symmetric
encryption. Since, authenticated subscribers in a closed
network also have the secret key from an earlier point in
time, only they can only decrypt the message. The secretkey
is hashed with SHA-256; first 128 bits of the key is used for
symmetric encryption (AES) and second 128 bits are used
for message authentication (HMAC).
K0-255 = SHA256(Ks)
m’ = AES(m, K0-127)
c = HMAC(m,K128-255)
In an Open Network, where there is no restriction on users
while joining the network,messageconfidentialitycannot be
provided because any peer can join the network and view
the message no matter how we encrypt it. Message
authentication can be provided in open network by signing
the message with the private key of the publisher. But this
does not ensure publisher authenticity because in a system
without central authority, any node can act as publisher.
3.4 Message Dissemination
A efficient way to disseminate messages to the subscribers is
to use Gossip[13] protocol shown in Fig 3.4. The protocol is
inspired by the form of gossip seen in social networks. A
gossip spreads in a social network when it starts as a
conversation betweentwoparties.Thesetwopartiesthentell
two more parties each and this message spreads across the
entire network. When one party hears the message for a
second time, it simply identifies the message and ignores it
because it has already received the message from someone
else.
Figure 3.4 – Gossip protocol
When a new message is to be disseminated, the publisher
selects b number of subscribers from its list and sends
messages to all of them. Now these randomly selected
subscribers send the message to randomly selected
subscribers since each subscriber will also have list of
subscribers for its topic. When all the subscribers have
received the message, the dissemination process stops. On
average, in logbN steps is required to disseminate the
message to all the nodes, where b is the number of
subscribers randomly selected and N is the total number of
nodes in the network.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1654
3.5 Message Flooding Control
Message flooding is a very common problem in a P2P
network. In our case, there aretwoscenarios where network
might get flooded. First, whenever a subscriber needs to
make subscription for a topic, it broadcast the subscribe
event in the network. While request message is traveling
across the network, the message can continuously keep
coming to one or more than one peers. Such messages will
keep circulating in the network for an infinite amount of
time and unnecessarilywasteresources.Second,whenevera
publisher publishes a message, it sends it to a random set of
forwarders (set of peers that routes). The forwarding peers
might receive repeated messages, so the forwarding peer
must be able to discard the repeated messages it receives so
that network resources are not wasted.
The problem of message flooding in a P2P network can best
be solved by Bloom filters [9]. Bloom filter is a simple and
elegant data structure that allows us to findoutifan element
is present in a set or not, given the possibility of false
positive result. Bloom filters can efficiently check if a
message, identified by a message id, has been seen before or
not. Every time a message is received by a peer, it checks if it
has already seen the message by querying the bloom filter.If
the node has not dealt with the message previously, then it
adds the message’s id into bloom filter and process the
packet further. Bloom filter can do addition and lookup in
O(k) time complexity, where k is number of hash functions
and each hash function work in constant time. Similarly, the
space consumption is also very low because instead of
storing whole message id, we are storing the hashedvalueof
a bit size.
In our network, thousands of messages might have to be
tracked and false positive scenarios of duplicate message
check can be ignored hence, usage of such efficient and
lightweight data structure helps saving a lot of computation
and memory for each node in the network.
3.6 UDP Packet Spoofing
Because of virtual addressing of the nodes, TCP connections
cannot be made because without IP address, three way
handshake protocol will not work. Therefore, we decided to
use UDP as the transport protocol. For our context, UDP
provides a helpful feature for ensuring anonymity i.e.
spoofing the UDP packets with false source IP addresses.
When a publisher publishes a message or a subscriber
subscribes, it can change the source IP address of the packet
and hence, it becomes even more difficult for an attacker to
map the virtual address to IP address. The choice of UDP
over TCP comes with a cost, and that is, message transfer is
not reliable for a UDP packet.
4. IMPLEMENTATION AND RESULT
The distributed nature of the application adds difficulty for
the implementation and testing. It is infeasible to code and
continuously setup a real distributed environmenttotest.So,
we needed a tool that allowed the simulation of a real like
distributed environment. Virtual machines would have a
solution to our problem but itconsumes too much ofthehost
machine’s resources and slows down the performance ofthe
system which is being used for development. Linux
containers are a better option compared to virtual machines
because they provide same set of features like isolation and
resource controlbutareverylightweightcomparedtoVirtual
Machines. A Python library Pycrypto, which has been
thoroughly tested for security, has also been used to for
cryptographic and hashing functionalities.
For initial testing, we set up 20 containers to simulate as
peers and formed a network of nodes in different
permutations and combinations. We used network
monitoring tool Wireshark to analyze the packets in the
network, and also we wrote MITM scripts for some nodes to
act as attackers for tampering the packets. After completion
of the implementation on real environment, we tested on 10
machines each having 8 processors (1.1GHzIntelPentiumIV
Xeon processors on Ubuntu 14) connected via a high speed
LAN. Similar to initial testing, wetested on differenttopology
of the network, and found that the communication between
nodes was anonymous and confidential. In the packet
analysis, we were unable to find the IP address of the node
who sent it and who receivedit. Being a P2Pnetwork,latency
of message transfer was high compared to centralized
implementation (Kafka, RabbitMQ), which was expectedasa
tradeoff for anonymity.
5. FUTURE WORK
The central service coordinator is at high load giventhatfact
that it has to maintain the global state of the network.
Maintaining the alive status of all nodes can get hectic for a
single central coordinator. As part of future work,weplanto
shard the network and assign the task of maintaining the
global state to multiple service coordinator, and these new
instances will work together to maintain a global state.
This work has not been subjectedtoa stringentperformance
analysis. Being a P2P network and having a path of
communication between nodes thatconstantlychanges over
time, it's difficult to come with statistics for latency and
throughput; thus, we plan to devise strategies for
performance analysis.
6. CONCLUSION
We have a presented a message exchange system that
calculates a secret sub-optimal path of communication and
allows entities to communicate without exposing their real
identity i.e. IP address. The idea of virtual addressing
enabled us to mask the identity of nodes and the idea of
Gossip protocol and virtual address routing enabled us to
disseminate the messages by concealing the identities. Also,
the usage of central service coordinator facilitated the
maintenance of global state of the network to prevent
network partition and ensure stability of the network.
Most of the research in the field of pub-sub network has
focused on performance and security but very little effort
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1655
has been made in introducing the dimension of anonymity.
Thus, we extended the pub-sub network to achieve
anonymity to a substantial extent.
REFERENCES
[1] Mudhakar Srivatsa, Ling Liu, “Securingpublish-subscribe
overlay services with eventguard” in CCS 05 Proceedings of
the 12th ACM conference on Computer andcommunications
security
[2] Joan Daemen and Vincent Rijmen, “The design of
Rijndael: AES-the advanced encryption standard” in
Springer Science & Business Media, 2013.
[3] Miguel Castro, Peter Druschel, A-M Kermarrec, and
Antony IT Rowstron, “Scribe: A large-scale
and decentralized application-level multicastinfrastructure”
IEEE Journal on Selected Areas in communications,
20(8):1489–1499, 2002.
[4] Antony Rowstron and Peter Druschel,
“Pastry: Scalable, decentralized object location, and routing
for large-scale peer-to-peer systems” inn IFIP/ACM
International Conference on Distributed Systems Platforms
and Open Distributed Processing,Springer, 2001.
[5] Ajoy Kumar Datta, Maria Gradinariu, Michel Raynal, and
Gwendal Simon, “Anonymous publish/ subscribe in p2p
networks” in Parallel and Distributed Processing
Symposium, 2003.
[6] Binh Vo and Steven Bellovin, “Anonymous publish-
subscribe systems” in International Conference
on Security andPrivacyinCommunicationSystems,Springer,
2014.
[7] Roger Dingledine, Nick Mathewson, and Paul Syverson.
“Tor: The second-generation onion router” in Technical
report, DTIC Document, 2004.
[8] Mesut Gunes, Udo Sorges, and Imed Bouazizi, “Ara-the
ant-colony based routing algorithm for Manets” in Parallel
Processing Workshops, 2002. Proceedings. International
Conference on, pages 79–85. IEEE, 2002.
[9] Burton H. Bloom “Space/time trade-offs in hash coding
with allowable errors - BLOOM – 1970” in Communications
of the ACM Volume 13 Issue 7, July 1970
[10] Andr´e Allavena, Alan Demers, and John E Hopcroft,
“Correctness of a gossip based membership Protocol” in
Proceedings of thetwenty-fourthannual ACMsymposium on
Principles of distributed computing, ACM, 2005
[11] Kevin Bauer, Damon McCoy, Dirk Grunwald, adayoshi
Kohno, and Douglas Sicker, ”Lowresource routing attacks
against tor” in Proceedings of the 2007 ACM workshop on
Privacy in electronic society, pages 11–20. ACM, 2007.
[12] Timothy G Abbott, Katherine JLai,Michael RLieberman,
and Eric C Price. Browser-based attacks on tor” in
International WorkshoponPrivacyEnhancingTechnologies,
pages 184–199. Springer, 2007.
[13] Dirk Merkel,”Docker: lightweight linux containers for
consistent development and deployment” in Linux Journal,
2014(239):2, 2014.

More Related Content

What's hot

How to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodologyHow to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodologycsandit
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Editor IJCATR
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
 
Whitepaper Deep Packet Inspection
Whitepaper Deep Packet InspectionWhitepaper Deep Packet Inspection
Whitepaper Deep Packet Inspectionipoque
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemEditor IJMTER
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
 
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...IJECEIAES
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
 
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and SecurityAnonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Securityijceronline
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractUser defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractSoftroniics india
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESUSER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESnexgentechnology
 
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONEFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONijiert bestjournal
 
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONA SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONacijjournal
 

What's hot (19)

How to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodologyHow to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodology
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
 
Whitepaper Deep Packet Inspection
Whitepaper Deep Packet InspectionWhitepaper Deep Packet Inspection
Whitepaper Deep Packet Inspection
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and SecurityAnonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Security
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractUser defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstract
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESUSER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
 
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONEFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
 
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONA SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
 
10.1.1.196.4366
10.1.1.196.436610.1.1.196.4366
10.1.1.196.4366
 

Similar to IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Network Architecture

Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...IJCERT JOURNAL
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYHOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYcscpconf
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...IRJET Journal
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetIRJET Journal
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transferIRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoceSAT Publishing House
 
Fundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorialFundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorialTuristicae
 
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET Journal
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYEditor IJMTER
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...IRJET Journal
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Similar to IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Network Architecture (20)

Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYHOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
Fundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorialFundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorial
 
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
 
A370110
A370110A370110
A370110
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY
 
J1087181
J1087181J1087181
J1087181
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Network Architecture

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1650 Design of Anonymous Publish-Subscribe Messaging System in a P2P Network Architecture Sushil Paneru1, Dr. R. PADMAVATHY2 1.2Department of Computer Science and Engineering, NIT Warangal ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Publish-subscribe is a popular asynchronous message exchange pattern that is widely used in distributed systems. Apache Kafka, RabbitMQ are some of the widely used centralized implementation of publish-subscribe message exchange system, which provides scalable and robust messaging service to connect various distributed services. Decoupling of publisher and subscriber is the nuance of publish-subscribe messaging pattern, but the aforementioned centralized implementations does not provide anonymity to publishers and subscribers i.e. an intruder having access to broker – the central entity — can find out the identity of publishers and subscribers. Thus, we present a design that masks the identity (IP address) of actors with virtual addressing — just as systemslike Bitcoinand decentralizes the broker by relying on P2P network architecture to avoid single point of failure along with provision of load distribution for message routing. Our proposed design trades off low latency with anonymity, which is conducive to buildingananonymous publish subscribe messaging system that ensures concealed identity of users along with data confidentiality and data integrity. Application of such anonymous system would be to construct a communication channel, whereinusercancontact each other and exchange data while protectingtheiridentities from each other and from outside parties, also such model would further allow governments to take part in covert operations or news agencies to obtain sensitive and ground breaking information secretly from a source. Key Words: Peer To Peer, publish subscribe, anonymity, decentralization, virtual address routing, bloom filter 1. INTRODUCTION With the shift in paradigm from centralized to decentralized systems in recent years, there arose a need for robust, simple and asynchronous way to exchange messages between the distributed services. Point to point messaging between services using HTTP/UPD/TCP turned out to be difficult with increase in the number of services as tremendous amount of effort was required to maintain an effective and simple communication betweensystems.Thus, in the process of easing out hurdlesinvolvedduringmessage exchange in a distributed system,systemdesignersoptedfor publish-subscribepatternwhereanexternal agentsimplifies the complexity in communication and makes the task of building a distributedapplicationeasier.Publish-subscribeis an asynchronous message exchange patternwherea sender, also called as publisher, does not send the message directly to the recipient, also termed as subscriber, but instead the message is sent to an entity called broker which then forwards the message to all the interestedsubscribers.Thus, such message exchange pattern introduces broker, an external agent, which decouples sender from receiver and enables many to many communication with minimal effort. Along with benefit offered by pub-subpatternlikeeasing out the process of message dissemination, it has itsownshare of security issues like authentication, anonymity of agents, availability and confidentiality. A pub-sub network without any encryption scheme can leak out the details of published data to other peers (no confidentiality); without any message or peer authentication, the system lacks data and system integrity. Without anonymity to the peers,therole of an agent, publisher or subscriber, can also be leaked out. This paper intends to present a solution to provide anonymity to the agents along data confidentiality and integrity. 1.1 Related Works Most of the existing work in the field of pub-sub network have focused on scalability, performance;someofthemhave provided approach for data confidentiality andintegrityand very few have talked about anonymity of the peers. One of the most popular pub-sub message exchange system is Scribe [3], which introduced the use of spanning tree consisting of subscribers for efficient data dissemination. Scribe depends on the features of Pastry P2P network [4] which is considered to be scalable but it cannot provide anonymity to the users. One of the popular work in the field of pub-sub is by MudhakarSrivatsa,LingLiu [1]whichbuilds a modular framework for providing confidentiality and integrity but not anonymity. One of the publish-subscribe systems that aims to provide anonymity is by Datta et al [5]. They propose a routing system based on maintaining multiple layers of weakly connected directed acyclic graphs. In this system, one or more sink nodes, which may change over time, become dissemination points receiving all publications and forwarding them to subscribers. However, anonymity is provided by assuming that the node from which a receiver gets a message may not be the original publisher. However, an adversary would still know that that node could possibly be an original publisher. Without probabilistic analysis of this possibility, it is difficult to say how well protected the publishers actually are. Also, no mention is made as to how difficult it is to identify subscribers in the system, and this has not been implemented. The other publish subscribe system is the work by Binh Vo and Steven M. Bellovin [6]. They propose the use of Tor hidden service [7] as an anonymous network which will handle the work of hiding the true identity of users and route messages by constructing spanning tree for
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1651 each topic among the peers. The approach to use Tor hidden service is quite slow and expensive because it includes maintaining relaynodesfortorandmulti-layeredencryption and decryption whereas there is single layered encryption and no involvement of relay nodes in our system and also it is to be noted we use virtual address routingforhidingpeers identity instead of Tor hidden service. Also, many attacks have been successfully made on Tor network andithasbeen broken by many systems in the past 1.2 Objective This paper aims to provide a set of designs that anonymizes the network along ensuring with data confidentiality and integrity. When we mention anonymity, we mean about hiding the IP address of the peer since the sole identity of a user on internet is its IP address. Just like in bitcoin, an anonymous system, virtual addressing is introduced to mask the real identity of the user; all communication is performed by addressing the packets to virtual address of the receiver peer. With the use of virtual address, there comes a need to route the packets on the basis of virtual address; therefore, we propose a routing protocol,whichisa variant of distance vector routing algorithm that trades off speed of packet transmission with anonymity. We also use a centralized service coordinator that helps bootstrap the network and intelligibly implements key management without jeopardizing the anonymity property of the network. A pub-sub network can be content based or topic based, but in this paper we focus on topic based network for simplicity. 2. PRELIMINARIES 2.1 Characteristics of P2P Network The underlying P2P network on which we pass messages is unstructured, very much like Bittorrent and Naspster. A central service coordinator is usedtotrack theglobal viewof the P2P network and helps new peers join the network. The central service coordinator ensures the degree of connectivity of peers i.e. a peer is connected to how many other peers; the reason behind this strategy is to nullify the effects of peer churning, which can debilitate the network. Even though the central service is compromised, the anonymity of the network won’t be at stake since the coordinator does not contain any data about the mapping of virtual address and the IP address of the peers. The service coordinator also tracks the availability of the peers via sending heartbeat — a basic UDP packet — to the peers and waits for the response to check if the peer is alive or not. Also, the underlying message transport protocol is UDP which offers the advantage of spoofingthesenderfieldof the packet. 2.1 Context of Anonymity The main crux of this work is introducing anonymity. To start, anonymity in our context should be defined. In this paper, anonymity refers to the following three situations:  An eavesdropper (i.e. a middle man) should not be able to know the identity (IP address) and role of peers during message exchange (i.e. whether they are a publisher or a subscriber).  A forwarder peer (a peer who helps in message dissemination) should not be able to know about the content of the messages that it is forwarding to other peers.  A publisher should not know the identity of subscribers. Similarly, subscribersshouldnotknow about the identity of the publisher. 2.3 Degree of Anonymity We define two kinds of system, open and closed, based on the how the peers are allowed to communicate and to what level of anonymity and other securities are provided. For an open system, anyone can join the network and a person can read any other person’s messages. An example of this would be a civil rights activist wanting to communicate to the masses in order to protest about Civil Rights Violation during a state of emergency (e.g. Arab uprising in Lebanon, Egypt, Syria, etc.), but is afraid that his/her identity will get leaked. This system will have anonymity and message authentication but no publisher authentication as without external authentication any peer can act as publisher On the other hand in a closed system, only those who have already obtained a secret key by some external means can join the network and communicate. For example, a source wants to leak sensitive informationtoa groupofnewspapers but want their identity to be concealed during this exchange of information, and the interested parties should have the secret key to participate during message exchange. Here, a closed network is going to be used. Unlike open system, introduction of an external secret key ensures the authentication of publisher i.e. the subscribers are ensured they will receive the message fromthepublisherwhohasthe secret key. Thus, closed system is supposed to havemessage authentication, publisher authentication and message confidentiality. 3. METHODOLOGY 3.1 The Role of Service Coordinator The service coordinator maintains the global state of the network; for example, it tracks of the alive nodes (via receiving heartbeat from nodes) on the network and also information about to how many other peers a node is connected to so that it can minimize the risk caused by peer churning — for example, prevention of formation of articulation point which can bipartition the network. So, when a node wishes to join the network, it has to contact service coordinator which, in response, sends a list of peers that the new node can connect to. The list of peersisselected in such a way that after connection, each node in the network is connected to some minimum number peers so
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1652 that effects of peer churning is minimized. Thus, service coordinator helps maintain the network to be in a healthy state. The service coordinator also act ascertificateauthority(CA). A peer can register its public key by providing its virtual address (further explained in section 3.2) and its public key. The CA accepts such key registration requests(orcanalsobe called as certificate generation) only whenthehashofpublic key matches with the virtual address of the node. Non- collision property of hash functions like SHA-256 ensures that a bad peer can't fool service coordinator to tamper with the certificate directory. Similarly, whenevera peerwantsto get the public key of another peer, it has to query the service coordinator with the virtual address of the peer whose public key it wants. The queried certificate will be signed by the service coordinator whose certificate (signed by some root CA like Godaddy) will be made available to a peer at the time of joining the network. Thus, service coordinator also acts as a trustful entity in the network who can be relied upon for distribution of public key. It can be argued that when service coordinator gets compromised, data can be leak out which can benefit a attacker to map the virtual address of a peer to its IP address. Except during peer's certificate registration, a peer does not have to provide its virtual address to service coordinator. The solution to this scenario is that, at the time of certificate registration, a peer spoofs the originfieldofthe UPD packet — unlike TCP, no handshake is required — which it sends to the CA. The reason that UDP is used at this point of contact with service coordinator is to spoof the real identity to service coordinator, which cannot be done with TCP since handshake is required. Thus, even if the service coordinator gets compromised at the time of certificate registration, the IP address that theattackerobserveswill be a spoofed one. Hence, the real identity of a peer remains secret. But a problem with service coordinator is that it is also a single point of failure. This can be mitigated by keeping another service coordinator in stand-by mode for a master slave configuration, where the slave service coordinator's state will continuously be updated by the master. 3.2 Virtual Addressing Usage of IP address in the standard pub-sub model makes it non-anonymous because messages can be traced easily and identities of peers can be revealed, unless some proxy or VPN is used. In fact, even the usage of VPN and proxy can reveal the identity of the user by accessing the central service provider, and this is standard procedurefollowed by government agencies. So, just like in systems like bitcoin, we introduce the usage of virtual address for addressing peers instead of IP addresses. Virtual address or nodeId is basically a hash of public key which the peer chooses for making its communication with other peersconfidential and authenticated. Rather than fixing the usage of a particular hash function, we let the user, as per their choice, choosethe hash function. This allows the system to evolve with the any kind of development of hash function in the community of cryptography. Hence, a nodeId will also contain a short header, along with the hash digest, that specifies the type of hash function used and the length of hashdigest.Anexample is shown below: [Hash function code][Length of hash digest][Hash digest] Since we are using virtual address to identify a node, we will need a way to route the packets in the network. Therefore, we have come up with a variant of distance vector routing algorithm, which is the algorithm used by routers to route the packets over internet. Virtual address routing basically help determine the sub-optimal path to route the packettoa destination without revealing identity of the peers involved. Similar to distance vector routing, each node maintains a table, as shown below in table 3.1, which has a row for each destination peer and a column for each of its directly attached neighbors; with the help of routing table, a node can only know the direction to destination, butnotthe whole path. In other words, a node will only know to which neighbor to send the packet for effective routing. Unlike distance vector routing, instead of distance, a node stores timestamp of the packet received from the neighbor which was sent to that node from sender node; timestampwill help decide the neighbor (direction) that allows sub-optimal routing in future. Until the routing table does not have entry for a destination peer, it can’t determine to which neighbor forward the packets to. So, packets are sent to all the neighbors i.e. broadcast until the packet reaches a node which has the entry for destination, and it can happen that the packet reaches all the way to destination during the broadcast. Also, to preclude the flooding of network, a unique message id (hash of the messagepacket)isgenerated for each message; so, that the already seen packet’s circulation can be stopped. This is further explained in section 3.5. An example is given below to explain how a node learns to construct routing table from the message packets being circulated in the network. Figure –1: Routing among peers, solid line represents connection between the peers, dotted line represents path a message was routed through
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1653 Table –1: Routing table of peer X Destination Neighbor peers (timestamp of message received) Peer Z Peer Y Peer W Peer A (virtual address) 5 8 -1 In Figure 3.1, let peer X received messages originated from Peer A through two of its neighbors (Peer Y and Peer Z). Peer X would then populate its routing tableasshowninTable3.1. For populating the routing table, timestamp of the event when the message was received is stored, and -1 if the node hasn’t ever received a message from a neighbor. Later, at some point of time, if Peer X receives a message from Peer B, it checks the destination’sVirtualAddressinsidethemessage header. If the destination address happens to be Peer A’s virtual address, Peer X then knows that it could forward the message to either Peer Z or Peer Y. Peer X then chooses the one from which it receivedthemessageearliesti.e.entrywith the least timestamp value, in this case peer Z. So, in Virtual Address Routing, each peer maintains its routing table by learning from the packets being routed in the network. 3.2.1 Publish Subscribe Events When a peer wants to subscribe to a topic, it broadcasts a subscription request query all over the network and the corresponding publisher and other subscribers of the same topic will store the virtual address and in response, publisher will send a dummy message along with its signature. Such broadcast is supposed to flood the network, for which we have come up with a solution, which is explained in section 3.5. Similarly, when the publisher intends to publish a message, it disseminates the message via gossip protocol (explained in section 3.4) along with its signature; the signature ensures message has not been tampered. The underlying routing happens as explained in section 3.2. Also, since the underlying transfer protocol is UDP, there is no need for exposing the source IP address unlike TCP, and thus, anonymity is attained by trading off reliability. Thus, with virtual address routing, we construct a sub- optimal path — which no peers knows about — to replace the need for a centralized broker, and also since every peer can act as a broker, the task of routing packets is distributed amongst all the nodes in the network. .3 Encryption and Authentication Along with anonymity, we aim to provide message confidentiality and message authentication. Public Key Encryption and symmetric key encryption is used for maintaining message confidentiality and message authentication so that a forwarder peer (P2P broker), who happens to be an attacker, won't be able to know content of the message and the message receiver will be assured of its source. In a Closed Network, the secret key, which is obtained from external sources, will act as the key for symmetric encryption. Since, authenticated subscribers in a closed network also have the secret key from an earlier point in time, only they can only decrypt the message. The secretkey is hashed with SHA-256; first 128 bits of the key is used for symmetric encryption (AES) and second 128 bits are used for message authentication (HMAC). K0-255 = SHA256(Ks) m’ = AES(m, K0-127) c = HMAC(m,K128-255) In an Open Network, where there is no restriction on users while joining the network,messageconfidentialitycannot be provided because any peer can join the network and view the message no matter how we encrypt it. Message authentication can be provided in open network by signing the message with the private key of the publisher. But this does not ensure publisher authenticity because in a system without central authority, any node can act as publisher. 3.4 Message Dissemination A efficient way to disseminate messages to the subscribers is to use Gossip[13] protocol shown in Fig 3.4. The protocol is inspired by the form of gossip seen in social networks. A gossip spreads in a social network when it starts as a conversation betweentwoparties.Thesetwopartiesthentell two more parties each and this message spreads across the entire network. When one party hears the message for a second time, it simply identifies the message and ignores it because it has already received the message from someone else. Figure 3.4 – Gossip protocol When a new message is to be disseminated, the publisher selects b number of subscribers from its list and sends messages to all of them. Now these randomly selected subscribers send the message to randomly selected subscribers since each subscriber will also have list of subscribers for its topic. When all the subscribers have received the message, the dissemination process stops. On average, in logbN steps is required to disseminate the message to all the nodes, where b is the number of subscribers randomly selected and N is the total number of nodes in the network.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1654 3.5 Message Flooding Control Message flooding is a very common problem in a P2P network. In our case, there aretwoscenarios where network might get flooded. First, whenever a subscriber needs to make subscription for a topic, it broadcast the subscribe event in the network. While request message is traveling across the network, the message can continuously keep coming to one or more than one peers. Such messages will keep circulating in the network for an infinite amount of time and unnecessarilywasteresources.Second,whenevera publisher publishes a message, it sends it to a random set of forwarders (set of peers that routes). The forwarding peers might receive repeated messages, so the forwarding peer must be able to discard the repeated messages it receives so that network resources are not wasted. The problem of message flooding in a P2P network can best be solved by Bloom filters [9]. Bloom filter is a simple and elegant data structure that allows us to findoutifan element is present in a set or not, given the possibility of false positive result. Bloom filters can efficiently check if a message, identified by a message id, has been seen before or not. Every time a message is received by a peer, it checks if it has already seen the message by querying the bloom filter.If the node has not dealt with the message previously, then it adds the message’s id into bloom filter and process the packet further. Bloom filter can do addition and lookup in O(k) time complexity, where k is number of hash functions and each hash function work in constant time. Similarly, the space consumption is also very low because instead of storing whole message id, we are storing the hashedvalueof a bit size. In our network, thousands of messages might have to be tracked and false positive scenarios of duplicate message check can be ignored hence, usage of such efficient and lightweight data structure helps saving a lot of computation and memory for each node in the network. 3.6 UDP Packet Spoofing Because of virtual addressing of the nodes, TCP connections cannot be made because without IP address, three way handshake protocol will not work. Therefore, we decided to use UDP as the transport protocol. For our context, UDP provides a helpful feature for ensuring anonymity i.e. spoofing the UDP packets with false source IP addresses. When a publisher publishes a message or a subscriber subscribes, it can change the source IP address of the packet and hence, it becomes even more difficult for an attacker to map the virtual address to IP address. The choice of UDP over TCP comes with a cost, and that is, message transfer is not reliable for a UDP packet. 4. IMPLEMENTATION AND RESULT The distributed nature of the application adds difficulty for the implementation and testing. It is infeasible to code and continuously setup a real distributed environmenttotest.So, we needed a tool that allowed the simulation of a real like distributed environment. Virtual machines would have a solution to our problem but itconsumes too much ofthehost machine’s resources and slows down the performance ofthe system which is being used for development. Linux containers are a better option compared to virtual machines because they provide same set of features like isolation and resource controlbutareverylightweightcomparedtoVirtual Machines. A Python library Pycrypto, which has been thoroughly tested for security, has also been used to for cryptographic and hashing functionalities. For initial testing, we set up 20 containers to simulate as peers and formed a network of nodes in different permutations and combinations. We used network monitoring tool Wireshark to analyze the packets in the network, and also we wrote MITM scripts for some nodes to act as attackers for tampering the packets. After completion of the implementation on real environment, we tested on 10 machines each having 8 processors (1.1GHzIntelPentiumIV Xeon processors on Ubuntu 14) connected via a high speed LAN. Similar to initial testing, wetested on differenttopology of the network, and found that the communication between nodes was anonymous and confidential. In the packet analysis, we were unable to find the IP address of the node who sent it and who receivedit. Being a P2Pnetwork,latency of message transfer was high compared to centralized implementation (Kafka, RabbitMQ), which was expectedasa tradeoff for anonymity. 5. FUTURE WORK The central service coordinator is at high load giventhatfact that it has to maintain the global state of the network. Maintaining the alive status of all nodes can get hectic for a single central coordinator. As part of future work,weplanto shard the network and assign the task of maintaining the global state to multiple service coordinator, and these new instances will work together to maintain a global state. This work has not been subjectedtoa stringentperformance analysis. Being a P2P network and having a path of communication between nodes thatconstantlychanges over time, it's difficult to come with statistics for latency and throughput; thus, we plan to devise strategies for performance analysis. 6. CONCLUSION We have a presented a message exchange system that calculates a secret sub-optimal path of communication and allows entities to communicate without exposing their real identity i.e. IP address. The idea of virtual addressing enabled us to mask the identity of nodes and the idea of Gossip protocol and virtual address routing enabled us to disseminate the messages by concealing the identities. Also, the usage of central service coordinator facilitated the maintenance of global state of the network to prevent network partition and ensure stability of the network. Most of the research in the field of pub-sub network has focused on performance and security but very little effort
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1655 has been made in introducing the dimension of anonymity. Thus, we extended the pub-sub network to achieve anonymity to a substantial extent. REFERENCES [1] Mudhakar Srivatsa, Ling Liu, “Securingpublish-subscribe overlay services with eventguard” in CCS 05 Proceedings of the 12th ACM conference on Computer andcommunications security [2] Joan Daemen and Vincent Rijmen, “The design of Rijndael: AES-the advanced encryption standard” in Springer Science & Business Media, 2013. [3] Miguel Castro, Peter Druschel, A-M Kermarrec, and Antony IT Rowstron, “Scribe: A large-scale and decentralized application-level multicastinfrastructure” IEEE Journal on Selected Areas in communications, 20(8):1489–1499, 2002. [4] Antony Rowstron and Peter Druschel, “Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems” inn IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing,Springer, 2001. [5] Ajoy Kumar Datta, Maria Gradinariu, Michel Raynal, and Gwendal Simon, “Anonymous publish/ subscribe in p2p networks” in Parallel and Distributed Processing Symposium, 2003. [6] Binh Vo and Steven Bellovin, “Anonymous publish- subscribe systems” in International Conference on Security andPrivacyinCommunicationSystems,Springer, 2014. [7] Roger Dingledine, Nick Mathewson, and Paul Syverson. “Tor: The second-generation onion router” in Technical report, DTIC Document, 2004. [8] Mesut Gunes, Udo Sorges, and Imed Bouazizi, “Ara-the ant-colony based routing algorithm for Manets” in Parallel Processing Workshops, 2002. Proceedings. International Conference on, pages 79–85. IEEE, 2002. [9] Burton H. Bloom “Space/time trade-offs in hash coding with allowable errors - BLOOM – 1970” in Communications of the ACM Volume 13 Issue 7, July 1970 [10] Andr´e Allavena, Alan Demers, and John E Hopcroft, “Correctness of a gossip based membership Protocol” in Proceedings of thetwenty-fourthannual ACMsymposium on Principles of distributed computing, ACM, 2005 [11] Kevin Bauer, Damon McCoy, Dirk Grunwald, adayoshi Kohno, and Douglas Sicker, ”Lowresource routing attacks against tor” in Proceedings of the 2007 ACM workshop on Privacy in electronic society, pages 11–20. ACM, 2007. [12] Timothy G Abbott, Katherine JLai,Michael RLieberman, and Eric C Price. Browser-based attacks on tor” in International WorkshoponPrivacyEnhancingTechnologies, pages 184–199. Springer, 2007. [13] Dirk Merkel,”Docker: lightweight linux containers for consistent development and deployment” in Linux Journal, 2014(239):2, 2014.