Submit Search
Upload
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Network Architecture
•
0 likes
•
8 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i11/IRJET-V5I11312.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
H0362052056
H0362052056
inventionjournals
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
IJNSA Journal
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast Services
IOSR Journals
“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
IJNSA Journal
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
IJMER
Lt2520382043
Lt2520382043
IJERA Editor
Recommended
H0362052056
H0362052056
inventionjournals
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
IJNSA Journal
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast Services
IOSR Journals
“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
IJNSA Journal
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
IJMER
Lt2520382043
Lt2520382043
IJERA Editor
How to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodology
csandit
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
AM Publications,India
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Editor IJCATR
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
Nexgen Technology
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
IJNSA Journal
Whitepaper Deep Packet Inspection
Whitepaper Deep Packet Inspection
ipoque
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
Editor IJMTER
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET Journal
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
IJECEIAES
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
IJECEIAES
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Security
ijceronline
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstract
Softroniics india
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
journalBEEI
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
nexgentechnology
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
ijiert bestjournal
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
acijjournal
10.1.1.196.4366
10.1.1.196.4366
Aram Khalili
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
Mumbai Academisc
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
cscpconf
More Related Content
What's hot
How to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodology
csandit
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
AM Publications,India
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Editor IJCATR
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
Nexgen Technology
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
IJNSA Journal
Whitepaper Deep Packet Inspection
Whitepaper Deep Packet Inspection
ipoque
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
Editor IJMTER
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET Journal
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
IJECEIAES
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
IJECEIAES
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Security
ijceronline
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstract
Softroniics india
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
journalBEEI
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
nexgentechnology
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
ijiert bestjournal
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
acijjournal
10.1.1.196.4366
10.1.1.196.4366
Aram Khalili
What's hot
(19)
How to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodology
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
Whitepaper Deep Packet Inspection
Whitepaper Deep Packet Inspection
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Security
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstract
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
10.1.1.196.4366
10.1.1.196.4366
Similar to IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Network Architecture
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
Mumbai Academisc
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
cscpconf
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
IRJET Journal
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
IRJET Journal
App for peer-to-peer file transfer
App for peer-to-peer file transfer
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
eSAT Publishing House
Peer to Peer services and File systems
Peer to Peer services and File systems
MNM Jain Engineering College
Fundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorial
Turisticae
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET Journal
A370110
A370110
International Advance Journal of Engineering Research
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Brenda Thomas
Authentication system with Decentralized chat app
Authentication system with Decentralized chat app
IRJET Journal
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY
Editor IJMTER
J1087181
J1087181
IJERD Editor
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
IRJET Journal
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
Similar to IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Network Architecture
(20)
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
App for peer-to-peer file transfer
App for peer-to-peer file transfer
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
Peer to Peer services and File systems
Peer to Peer services and File systems
Fundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorial
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
A370110
A370110
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Authentication system with Decentralized chat app
Authentication system with Decentralized chat app
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY
J1087181
J1087181
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
computer application and construction management
computer application and construction management
MariconPadriquez1
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
Purva Nikam
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
ShivangiSharma879191
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Recently uploaded
(20)
computer application and construction management
computer application and construction management
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Network Architecture
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1650 Design of Anonymous Publish-Subscribe Messaging System in a P2P Network Architecture Sushil Paneru1, Dr. R. PADMAVATHY2 1.2Department of Computer Science and Engineering, NIT Warangal ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Publish-subscribe is a popular asynchronous message exchange pattern that is widely used in distributed systems. Apache Kafka, RabbitMQ are some of the widely used centralized implementation of publish-subscribe message exchange system, which provides scalable and robust messaging service to connect various distributed services. Decoupling of publisher and subscriber is the nuance of publish-subscribe messaging pattern, but the aforementioned centralized implementations does not provide anonymity to publishers and subscribers i.e. an intruder having access to broker – the central entity — can find out the identity of publishers and subscribers. Thus, we present a design that masks the identity (IP address) of actors with virtual addressing — just as systemslike Bitcoinand decentralizes the broker by relying on P2P network architecture to avoid single point of failure along with provision of load distribution for message routing. Our proposed design trades off low latency with anonymity, which is conducive to buildingananonymous publish subscribe messaging system that ensures concealed identity of users along with data confidentiality and data integrity. Application of such anonymous system would be to construct a communication channel, whereinusercancontact each other and exchange data while protectingtheiridentities from each other and from outside parties, also such model would further allow governments to take part in covert operations or news agencies to obtain sensitive and ground breaking information secretly from a source. Key Words: Peer To Peer, publish subscribe, anonymity, decentralization, virtual address routing, bloom filter 1. INTRODUCTION With the shift in paradigm from centralized to decentralized systems in recent years, there arose a need for robust, simple and asynchronous way to exchange messages between the distributed services. Point to point messaging between services using HTTP/UPD/TCP turned out to be difficult with increase in the number of services as tremendous amount of effort was required to maintain an effective and simple communication betweensystems.Thus, in the process of easing out hurdlesinvolvedduringmessage exchange in a distributed system,systemdesignersoptedfor publish-subscribepatternwhereanexternal agentsimplifies the complexity in communication and makes the task of building a distributedapplicationeasier.Publish-subscribeis an asynchronous message exchange patternwherea sender, also called as publisher, does not send the message directly to the recipient, also termed as subscriber, but instead the message is sent to an entity called broker which then forwards the message to all the interestedsubscribers.Thus, such message exchange pattern introduces broker, an external agent, which decouples sender from receiver and enables many to many communication with minimal effort. Along with benefit offered by pub-subpatternlikeeasing out the process of message dissemination, it has itsownshare of security issues like authentication, anonymity of agents, availability and confidentiality. A pub-sub network without any encryption scheme can leak out the details of published data to other peers (no confidentiality); without any message or peer authentication, the system lacks data and system integrity. Without anonymity to the peers,therole of an agent, publisher or subscriber, can also be leaked out. This paper intends to present a solution to provide anonymity to the agents along data confidentiality and integrity. 1.1 Related Works Most of the existing work in the field of pub-sub network have focused on scalability, performance;someofthemhave provided approach for data confidentiality andintegrityand very few have talked about anonymity of the peers. One of the most popular pub-sub message exchange system is Scribe [3], which introduced the use of spanning tree consisting of subscribers for efficient data dissemination. Scribe depends on the features of Pastry P2P network [4] which is considered to be scalable but it cannot provide anonymity to the users. One of the popular work in the field of pub-sub is by MudhakarSrivatsa,LingLiu [1]whichbuilds a modular framework for providing confidentiality and integrity but not anonymity. One of the publish-subscribe systems that aims to provide anonymity is by Datta et al [5]. They propose a routing system based on maintaining multiple layers of weakly connected directed acyclic graphs. In this system, one or more sink nodes, which may change over time, become dissemination points receiving all publications and forwarding them to subscribers. However, anonymity is provided by assuming that the node from which a receiver gets a message may not be the original publisher. However, an adversary would still know that that node could possibly be an original publisher. Without probabilistic analysis of this possibility, it is difficult to say how well protected the publishers actually are. Also, no mention is made as to how difficult it is to identify subscribers in the system, and this has not been implemented. The other publish subscribe system is the work by Binh Vo and Steven M. Bellovin [6]. They propose the use of Tor hidden service [7] as an anonymous network which will handle the work of hiding the true identity of users and route messages by constructing spanning tree for
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1651 each topic among the peers. The approach to use Tor hidden service is quite slow and expensive because it includes maintaining relaynodesfortorandmulti-layeredencryption and decryption whereas there is single layered encryption and no involvement of relay nodes in our system and also it is to be noted we use virtual address routingforhidingpeers identity instead of Tor hidden service. Also, many attacks have been successfully made on Tor network andithasbeen broken by many systems in the past 1.2 Objective This paper aims to provide a set of designs that anonymizes the network along ensuring with data confidentiality and integrity. When we mention anonymity, we mean about hiding the IP address of the peer since the sole identity of a user on internet is its IP address. Just like in bitcoin, an anonymous system, virtual addressing is introduced to mask the real identity of the user; all communication is performed by addressing the packets to virtual address of the receiver peer. With the use of virtual address, there comes a need to route the packets on the basis of virtual address; therefore, we propose a routing protocol,whichisa variant of distance vector routing algorithm that trades off speed of packet transmission with anonymity. We also use a centralized service coordinator that helps bootstrap the network and intelligibly implements key management without jeopardizing the anonymity property of the network. A pub-sub network can be content based or topic based, but in this paper we focus on topic based network for simplicity. 2. PRELIMINARIES 2.1 Characteristics of P2P Network The underlying P2P network on which we pass messages is unstructured, very much like Bittorrent and Naspster. A central service coordinator is usedtotrack theglobal viewof the P2P network and helps new peers join the network. The central service coordinator ensures the degree of connectivity of peers i.e. a peer is connected to how many other peers; the reason behind this strategy is to nullify the effects of peer churning, which can debilitate the network. Even though the central service is compromised, the anonymity of the network won’t be at stake since the coordinator does not contain any data about the mapping of virtual address and the IP address of the peers. The service coordinator also tracks the availability of the peers via sending heartbeat — a basic UDP packet — to the peers and waits for the response to check if the peer is alive or not. Also, the underlying message transport protocol is UDP which offers the advantage of spoofingthesenderfieldof the packet. 2.1 Context of Anonymity The main crux of this work is introducing anonymity. To start, anonymity in our context should be defined. In this paper, anonymity refers to the following three situations: An eavesdropper (i.e. a middle man) should not be able to know the identity (IP address) and role of peers during message exchange (i.e. whether they are a publisher or a subscriber). A forwarder peer (a peer who helps in message dissemination) should not be able to know about the content of the messages that it is forwarding to other peers. A publisher should not know the identity of subscribers. Similarly, subscribersshouldnotknow about the identity of the publisher. 2.3 Degree of Anonymity We define two kinds of system, open and closed, based on the how the peers are allowed to communicate and to what level of anonymity and other securities are provided. For an open system, anyone can join the network and a person can read any other person’s messages. An example of this would be a civil rights activist wanting to communicate to the masses in order to protest about Civil Rights Violation during a state of emergency (e.g. Arab uprising in Lebanon, Egypt, Syria, etc.), but is afraid that his/her identity will get leaked. This system will have anonymity and message authentication but no publisher authentication as without external authentication any peer can act as publisher On the other hand in a closed system, only those who have already obtained a secret key by some external means can join the network and communicate. For example, a source wants to leak sensitive informationtoa groupofnewspapers but want their identity to be concealed during this exchange of information, and the interested parties should have the secret key to participate during message exchange. Here, a closed network is going to be used. Unlike open system, introduction of an external secret key ensures the authentication of publisher i.e. the subscribers are ensured they will receive the message fromthepublisherwhohasthe secret key. Thus, closed system is supposed to havemessage authentication, publisher authentication and message confidentiality. 3. METHODOLOGY 3.1 The Role of Service Coordinator The service coordinator maintains the global state of the network; for example, it tracks of the alive nodes (via receiving heartbeat from nodes) on the network and also information about to how many other peers a node is connected to so that it can minimize the risk caused by peer churning — for example, prevention of formation of articulation point which can bipartition the network. So, when a node wishes to join the network, it has to contact service coordinator which, in response, sends a list of peers that the new node can connect to. The list of peersisselected in such a way that after connection, each node in the network is connected to some minimum number peers so
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1652 that effects of peer churning is minimized. Thus, service coordinator helps maintain the network to be in a healthy state. The service coordinator also act ascertificateauthority(CA). A peer can register its public key by providing its virtual address (further explained in section 3.2) and its public key. The CA accepts such key registration requests(orcanalsobe called as certificate generation) only whenthehashofpublic key matches with the virtual address of the node. Non- collision property of hash functions like SHA-256 ensures that a bad peer can't fool service coordinator to tamper with the certificate directory. Similarly, whenevera peerwantsto get the public key of another peer, it has to query the service coordinator with the virtual address of the peer whose public key it wants. The queried certificate will be signed by the service coordinator whose certificate (signed by some root CA like Godaddy) will be made available to a peer at the time of joining the network. Thus, service coordinator also acts as a trustful entity in the network who can be relied upon for distribution of public key. It can be argued that when service coordinator gets compromised, data can be leak out which can benefit a attacker to map the virtual address of a peer to its IP address. Except during peer's certificate registration, a peer does not have to provide its virtual address to service coordinator. The solution to this scenario is that, at the time of certificate registration, a peer spoofs the originfieldofthe UPD packet — unlike TCP, no handshake is required — which it sends to the CA. The reason that UDP is used at this point of contact with service coordinator is to spoof the real identity to service coordinator, which cannot be done with TCP since handshake is required. Thus, even if the service coordinator gets compromised at the time of certificate registration, the IP address that theattackerobserveswill be a spoofed one. Hence, the real identity of a peer remains secret. But a problem with service coordinator is that it is also a single point of failure. This can be mitigated by keeping another service coordinator in stand-by mode for a master slave configuration, where the slave service coordinator's state will continuously be updated by the master. 3.2 Virtual Addressing Usage of IP address in the standard pub-sub model makes it non-anonymous because messages can be traced easily and identities of peers can be revealed, unless some proxy or VPN is used. In fact, even the usage of VPN and proxy can reveal the identity of the user by accessing the central service provider, and this is standard procedurefollowed by government agencies. So, just like in systems like bitcoin, we introduce the usage of virtual address for addressing peers instead of IP addresses. Virtual address or nodeId is basically a hash of public key which the peer chooses for making its communication with other peersconfidential and authenticated. Rather than fixing the usage of a particular hash function, we let the user, as per their choice, choosethe hash function. This allows the system to evolve with the any kind of development of hash function in the community of cryptography. Hence, a nodeId will also contain a short header, along with the hash digest, that specifies the type of hash function used and the length of hashdigest.Anexample is shown below: [Hash function code][Length of hash digest][Hash digest] Since we are using virtual address to identify a node, we will need a way to route the packets in the network. Therefore, we have come up with a variant of distance vector routing algorithm, which is the algorithm used by routers to route the packets over internet. Virtual address routing basically help determine the sub-optimal path to route the packettoa destination without revealing identity of the peers involved. Similar to distance vector routing, each node maintains a table, as shown below in table 3.1, which has a row for each destination peer and a column for each of its directly attached neighbors; with the help of routing table, a node can only know the direction to destination, butnotthe whole path. In other words, a node will only know to which neighbor to send the packet for effective routing. Unlike distance vector routing, instead of distance, a node stores timestamp of the packet received from the neighbor which was sent to that node from sender node; timestampwill help decide the neighbor (direction) that allows sub-optimal routing in future. Until the routing table does not have entry for a destination peer, it can’t determine to which neighbor forward the packets to. So, packets are sent to all the neighbors i.e. broadcast until the packet reaches a node which has the entry for destination, and it can happen that the packet reaches all the way to destination during the broadcast. Also, to preclude the flooding of network, a unique message id (hash of the messagepacket)isgenerated for each message; so, that the already seen packet’s circulation can be stopped. This is further explained in section 3.5. An example is given below to explain how a node learns to construct routing table from the message packets being circulated in the network. Figure –1: Routing among peers, solid line represents connection between the peers, dotted line represents path a message was routed through
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1653 Table –1: Routing table of peer X Destination Neighbor peers (timestamp of message received) Peer Z Peer Y Peer W Peer A (virtual address) 5 8 -1 In Figure 3.1, let peer X received messages originated from Peer A through two of its neighbors (Peer Y and Peer Z). Peer X would then populate its routing tableasshowninTable3.1. For populating the routing table, timestamp of the event when the message was received is stored, and -1 if the node hasn’t ever received a message from a neighbor. Later, at some point of time, if Peer X receives a message from Peer B, it checks the destination’sVirtualAddressinsidethemessage header. If the destination address happens to be Peer A’s virtual address, Peer X then knows that it could forward the message to either Peer Z or Peer Y. Peer X then chooses the one from which it receivedthemessageearliesti.e.entrywith the least timestamp value, in this case peer Z. So, in Virtual Address Routing, each peer maintains its routing table by learning from the packets being routed in the network. 3.2.1 Publish Subscribe Events When a peer wants to subscribe to a topic, it broadcasts a subscription request query all over the network and the corresponding publisher and other subscribers of the same topic will store the virtual address and in response, publisher will send a dummy message along with its signature. Such broadcast is supposed to flood the network, for which we have come up with a solution, which is explained in section 3.5. Similarly, when the publisher intends to publish a message, it disseminates the message via gossip protocol (explained in section 3.4) along with its signature; the signature ensures message has not been tampered. The underlying routing happens as explained in section 3.2. Also, since the underlying transfer protocol is UDP, there is no need for exposing the source IP address unlike TCP, and thus, anonymity is attained by trading off reliability. Thus, with virtual address routing, we construct a sub- optimal path — which no peers knows about — to replace the need for a centralized broker, and also since every peer can act as a broker, the task of routing packets is distributed amongst all the nodes in the network. .3 Encryption and Authentication Along with anonymity, we aim to provide message confidentiality and message authentication. Public Key Encryption and symmetric key encryption is used for maintaining message confidentiality and message authentication so that a forwarder peer (P2P broker), who happens to be an attacker, won't be able to know content of the message and the message receiver will be assured of its source. In a Closed Network, the secret key, which is obtained from external sources, will act as the key for symmetric encryption. Since, authenticated subscribers in a closed network also have the secret key from an earlier point in time, only they can only decrypt the message. The secretkey is hashed with SHA-256; first 128 bits of the key is used for symmetric encryption (AES) and second 128 bits are used for message authentication (HMAC). K0-255 = SHA256(Ks) m’ = AES(m, K0-127) c = HMAC(m,K128-255) In an Open Network, where there is no restriction on users while joining the network,messageconfidentialitycannot be provided because any peer can join the network and view the message no matter how we encrypt it. Message authentication can be provided in open network by signing the message with the private key of the publisher. But this does not ensure publisher authenticity because in a system without central authority, any node can act as publisher. 3.4 Message Dissemination A efficient way to disseminate messages to the subscribers is to use Gossip[13] protocol shown in Fig 3.4. The protocol is inspired by the form of gossip seen in social networks. A gossip spreads in a social network when it starts as a conversation betweentwoparties.Thesetwopartiesthentell two more parties each and this message spreads across the entire network. When one party hears the message for a second time, it simply identifies the message and ignores it because it has already received the message from someone else. Figure 3.4 – Gossip protocol When a new message is to be disseminated, the publisher selects b number of subscribers from its list and sends messages to all of them. Now these randomly selected subscribers send the message to randomly selected subscribers since each subscriber will also have list of subscribers for its topic. When all the subscribers have received the message, the dissemination process stops. On average, in logbN steps is required to disseminate the message to all the nodes, where b is the number of subscribers randomly selected and N is the total number of nodes in the network.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1654 3.5 Message Flooding Control Message flooding is a very common problem in a P2P network. In our case, there aretwoscenarios where network might get flooded. First, whenever a subscriber needs to make subscription for a topic, it broadcast the subscribe event in the network. While request message is traveling across the network, the message can continuously keep coming to one or more than one peers. Such messages will keep circulating in the network for an infinite amount of time and unnecessarilywasteresources.Second,whenevera publisher publishes a message, it sends it to a random set of forwarders (set of peers that routes). The forwarding peers might receive repeated messages, so the forwarding peer must be able to discard the repeated messages it receives so that network resources are not wasted. The problem of message flooding in a P2P network can best be solved by Bloom filters [9]. Bloom filter is a simple and elegant data structure that allows us to findoutifan element is present in a set or not, given the possibility of false positive result. Bloom filters can efficiently check if a message, identified by a message id, has been seen before or not. Every time a message is received by a peer, it checks if it has already seen the message by querying the bloom filter.If the node has not dealt with the message previously, then it adds the message’s id into bloom filter and process the packet further. Bloom filter can do addition and lookup in O(k) time complexity, where k is number of hash functions and each hash function work in constant time. Similarly, the space consumption is also very low because instead of storing whole message id, we are storing the hashedvalueof a bit size. In our network, thousands of messages might have to be tracked and false positive scenarios of duplicate message check can be ignored hence, usage of such efficient and lightweight data structure helps saving a lot of computation and memory for each node in the network. 3.6 UDP Packet Spoofing Because of virtual addressing of the nodes, TCP connections cannot be made because without IP address, three way handshake protocol will not work. Therefore, we decided to use UDP as the transport protocol. For our context, UDP provides a helpful feature for ensuring anonymity i.e. spoofing the UDP packets with false source IP addresses. When a publisher publishes a message or a subscriber subscribes, it can change the source IP address of the packet and hence, it becomes even more difficult for an attacker to map the virtual address to IP address. The choice of UDP over TCP comes with a cost, and that is, message transfer is not reliable for a UDP packet. 4. IMPLEMENTATION AND RESULT The distributed nature of the application adds difficulty for the implementation and testing. It is infeasible to code and continuously setup a real distributed environmenttotest.So, we needed a tool that allowed the simulation of a real like distributed environment. Virtual machines would have a solution to our problem but itconsumes too much ofthehost machine’s resources and slows down the performance ofthe system which is being used for development. Linux containers are a better option compared to virtual machines because they provide same set of features like isolation and resource controlbutareverylightweightcomparedtoVirtual Machines. A Python library Pycrypto, which has been thoroughly tested for security, has also been used to for cryptographic and hashing functionalities. For initial testing, we set up 20 containers to simulate as peers and formed a network of nodes in different permutations and combinations. We used network monitoring tool Wireshark to analyze the packets in the network, and also we wrote MITM scripts for some nodes to act as attackers for tampering the packets. After completion of the implementation on real environment, we tested on 10 machines each having 8 processors (1.1GHzIntelPentiumIV Xeon processors on Ubuntu 14) connected via a high speed LAN. Similar to initial testing, wetested on differenttopology of the network, and found that the communication between nodes was anonymous and confidential. In the packet analysis, we were unable to find the IP address of the node who sent it and who receivedit. Being a P2Pnetwork,latency of message transfer was high compared to centralized implementation (Kafka, RabbitMQ), which was expectedasa tradeoff for anonymity. 5. FUTURE WORK The central service coordinator is at high load giventhatfact that it has to maintain the global state of the network. Maintaining the alive status of all nodes can get hectic for a single central coordinator. As part of future work,weplanto shard the network and assign the task of maintaining the global state to multiple service coordinator, and these new instances will work together to maintain a global state. This work has not been subjectedtoa stringentperformance analysis. Being a P2P network and having a path of communication between nodes thatconstantlychanges over time, it's difficult to come with statistics for latency and throughput; thus, we plan to devise strategies for performance analysis. 6. CONCLUSION We have a presented a message exchange system that calculates a secret sub-optimal path of communication and allows entities to communicate without exposing their real identity i.e. IP address. The idea of virtual addressing enabled us to mask the identity of nodes and the idea of Gossip protocol and virtual address routing enabled us to disseminate the messages by concealing the identities. Also, the usage of central service coordinator facilitated the maintenance of global state of the network to prevent network partition and ensure stability of the network. Most of the research in the field of pub-sub network has focused on performance and security but very little effort
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1655 has been made in introducing the dimension of anonymity. Thus, we extended the pub-sub network to achieve anonymity to a substantial extent. REFERENCES [1] Mudhakar Srivatsa, Ling Liu, “Securingpublish-subscribe overlay services with eventguard” in CCS 05 Proceedings of the 12th ACM conference on Computer andcommunications security [2] Joan Daemen and Vincent Rijmen, “The design of Rijndael: AES-the advanced encryption standard” in Springer Science & Business Media, 2013. [3] Miguel Castro, Peter Druschel, A-M Kermarrec, and Antony IT Rowstron, “Scribe: A large-scale and decentralized application-level multicastinfrastructure” IEEE Journal on Selected Areas in communications, 20(8):1489–1499, 2002. [4] Antony Rowstron and Peter Druschel, “Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems” inn IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing,Springer, 2001. [5] Ajoy Kumar Datta, Maria Gradinariu, Michel Raynal, and Gwendal Simon, “Anonymous publish/ subscribe in p2p networks” in Parallel and Distributed Processing Symposium, 2003. [6] Binh Vo and Steven Bellovin, “Anonymous publish- subscribe systems” in International Conference on Security andPrivacyinCommunicationSystems,Springer, 2014. [7] Roger Dingledine, Nick Mathewson, and Paul Syverson. “Tor: The second-generation onion router” in Technical report, DTIC Document, 2004. [8] Mesut Gunes, Udo Sorges, and Imed Bouazizi, “Ara-the ant-colony based routing algorithm for Manets” in Parallel Processing Workshops, 2002. Proceedings. International Conference on, pages 79–85. IEEE, 2002. [9] Burton H. Bloom “Space/time trade-offs in hash coding with allowable errors - BLOOM – 1970” in Communications of the ACM Volume 13 Issue 7, July 1970 [10] Andr´e Allavena, Alan Demers, and John E Hopcroft, “Correctness of a gossip based membership Protocol” in Proceedings of thetwenty-fourthannual ACMsymposium on Principles of distributed computing, ACM, 2005 [11] Kevin Bauer, Damon McCoy, Dirk Grunwald, adayoshi Kohno, and Douglas Sicker, ”Lowresource routing attacks against tor” in Proceedings of the 2007 ACM workshop on Privacy in electronic society, pages 11–20. ACM, 2007. [12] Timothy G Abbott, Katherine JLai,Michael RLieberman, and Eric C Price. Browser-based attacks on tor” in International WorkshoponPrivacyEnhancingTechnologies, pages 184–199. Springer, 2007. [13] Dirk Merkel,”Docker: lightweight linux containers for consistent development and deployment” in Linux Journal, 2014(239):2, 2014.
Download now