A NOVEL APPROACH TO PROVIDE CONFIDENTIALITY AND AUTHENTICATION IN A BROKER-LESS CONTENT-BASED PUBLISH/SUBSCRIBE SYSTEM
C.Ratna Prabha, P.Ragha Vardhani, , ,
Publish/subscribe systems has evolved as an striking communication model for building Internet-wide distributed systems by
decoupling senders of messages from receivers. So far most of the research on publish/subscribe has focused on other areas such as efficient
event routing, event filtering etc. Very trivial research has been published regarding securing publish/subscribe systems. In content based public
subscribe systems authentication and confidentiality are basic security issues. In this paper we presents a new approach to provide
confidentiality and authentication in a broker-less content-based publish/subscribe system. By using pairing based cryptography mechanism,
authentication and confidentiality for public subscribe event is ensured. Additionally, an algorithm to cluster subscribers according to their
subscriptions preserves a weak notion of subscription confidentiality .To enable efficient routing of encrypted events searchable encryption is
provided. To support weak subscription confidentiality, multi credential routing a new event distribution method is provided. Also comprehensive
analyses of different attacks on subscription confidentiality are provided. The overall methodology provides Key management for identity based
encryption, cost for encryption decryption and routing based on subscription of attributes.
C.Ratna Prabha,P.Ragha Vardhani."A NOVEL APPROACH TO PROVIDE CONFIDENTIALITY AND AUTHENTICATION IN A BROKER-LESS CONTENT-BASED PUBLISH/SUBSCRIBE SYSTEM". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 05,pp.383-386, May - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I521.pdf,
 E. Anceaume, M. Gradinariu, A.K. Datta, G. Simon, andA. Virgillito, â€œA Semantic Overlay for Self- Peer-toPeer Publish/Subscribe,â€ Proc. 26th IEEE Intâ€™l Conf. Distributed Computing Systems (ICDCS), 2006.
 Antonio Carzaniga, Michele Papalini, Alexander L. Wolf â€œContent-Based Publish/Subscribe Networking and InformationCentric Networkingâ€.
 J. Bethencourt, A. Sahai, and B. Waters, â€œCiphertextPolicy Attribute-Based Encryption,â€ Proc. IEEE Symp. Security and Privacy, 2007.
 D. Boneh and M.K. Franklin, â€œIdentity-Based Encryption from the Weil Pairing,â€ Proc. Intâ€™l Cryptology Conf. Advances in Cryptology, 2001.
 H. Khurana, â€œScalable Security and Accounting Services for Content-Based Publish/Subscribe Systems,â€ Proc. ACM Symp. Applied Computing, 2005.
 L. Opyrchal and A. Prakash, â€œSecure Distribution of Events in Content-Based Publish Subscribe Systems,â€ Proc. 10th Conf. USENIX Security Symp., 2001.
 L.I.W. Pesonen, D.M. Eyers, and J. Bacon, â€œEncryptionEnforced Access Control in Dynamic Multi-Domain Publish/Subscribe Networks,â€ Proc. ACM Intâ€™l Conf. Distributed Event-Based Systems (DEBS), 2007.
 P.Pietzuch,â€œHermes: A Scalable Event-Based Middleware,â€ PhD dissertation, Univ. of Cambridge, Feb. 2004.
 A. Shikfa, M. O Â¨ nen, and R. Molva, â€œPrivacyPreserving Content-Based Publish/Subscribe Networks,â€ Proc. Emerging Challenges for Security, Privacy and Trust, 2009.
M. Srivatsa, L. Liu, and A. Iyengar, â€œEventGuard: A System Architecture for Securing Publish-Subscribe Networks,â€ ACM Trans. Computer Systems, vol. 29, article 10, 2011.
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.