Author : Reethalakshmi M D 1
Date of Publication :7th August 2015
Abstract: Providing security mechanism such as authentication and confidentiality is a challenging issue in a publisher subscriber system due to loose coupling of publisher and subscriber. In this paper we present an approach to provide authentication, confidentiality in the publisher subscriber system. The authentication of publisher and subscriber as well as confidentiality of events is ensured by the use of pairing-based cryptographic mechanism such as cipher text policy attribute based encryption. The novelty of this work is that we use the layered encryption to increase the security with less overhead of key management. Here we have considered tree structure to maintain the subscriber requirements and each level in tree is considered as zone and different security level is provided for each zone.
Reference :
-
- Mihaela Ion1, Giovanni Russello, and Bruno Crispo, ” Supporting Publication and Subscription Confidentiality in Pub/Sub Networks” , Sixth Int’l ICST Conf. Security and Privacy in Comm. Networks (SecureComm),2010
- J. Bacon, D.M. Eyers, J. Singh, and P.R. Pietzuch, “Access Control in Publish/Subscribe Systems,”Second ACM Int’l Conf. Distributed EventBased Systems (DEBS), 2008.
- Susan Hohenberger and Brent Waters,” Attribute-Based Encryption with Fast Decryption”2008
- S. Choi, G. Ghinita, and E. Bertino, “A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations,” 21st Int’l Conf. Database and Expert Systems Applications: Part I, 2010.
- P. Pietzuch, “Hermes: A Scalable Event-Based Middleware,” PhD dissertation, Univ. of Cambridge, Feb. 2004.
- A. Shikfa, M. O nen, and R. Molva, “PrivacyPreserving Content- Based Publish/Subscribe Networks,” Emerging Challenges for Security, Privacy and Trust
- M.A. Tariq, B. Koldehofe, A. Altaweel, and K. Rothermel, “Providing Basic Security Mechanisms in Broker-Less Publish/Subscribe Systems,” Proc. ACM Fourth Int’l Conf. Distributed Event- Based Systems (DEBS), 2010.
- Brent Waters, Amit Sahai ,“Fuzzy IdentityBased Encryption
- Dan Boneh_ Matthew Frankliny “IdentityBased Encryption from the Weil Pairing” 2001
- Muhammad Adnan Tariq, Boris Koldehofe, and Kurt Rothermel ,”Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption”, transactions on parallel and distributed systems, vol. 25, no. 2, February 2014 .
- Manish Karir John S. Baras,” LES: Layered Encryption Security”.
- Huayang Cao, Peidong Zhu, and Xicheng Lu, , China Andrei Gurtov, Helsinki,“A Layered Encryption Mechanism for Networked Critical Infrastructures”, IEEE Network January/February 2013.