A Survey On Confidentiality and Authentication in Content Based Publish Subscribe System
A Survey On Confidentiality and Authentication in Content Based Publish Subscribe System
Volume: 3 Issue: 5
ISSN: 2321-8169
3433 - 3435
_______________________________________________________________________________________________
Vijaya S.C
Department of Computer Science and Engineering
Vemana Institute of Technology
Bengaluru, India
[email protected]
Abstract The basic security mechanism such as authentication and confidentiality is highly challenging in a content based publish/subscribe
system. Authentication of publisher and subscribers is difficult to achieve due to loose coupling of publisher and subscriber. The authentication
and confidentiality of publisher and subscribers of events ensured by adapting the pairing based cryptography mechanism. Furthermore, an
algorithm to cluster subscriber according to their subscriptions preserves a weak notion of subscription confidentiality.
Keywords: Publish/subscribe, security, identity based encryption.
__________________________________________________*****_________________________________________________
I.
INTRODUCTION
RELATED WORK
_______________________________________________________________________________________
ISSN: 2321-8169
3433 - 3435
_______________________________________________________________________________________________
server storing the data is compromised, then the confidentiality
of data will be compromised. A system for realizing complex
access control on encrypted data that is cipher text-policy
attribute based encryption. By using the technique encrypted
data can be kept confidential even if storage server is not
trusted. Moreover, the methods are secure against collision
attacks. Attribute based encryption systems used attributes to
describe the encrypt data and built policies into users key,
while in proposed system attributes are used to describe a
users credentials and encrypting data determines a policy for
who can decrypt.
In [3], the user bob who sends email to user Alice encrypted
under Alice public key. An email gateway wants to test
whether the email contains the keyword so that it could route
the email accordingly. Alice, on other hand does not wish to
give the gateway the ability to decrypt all her messages. To
define and construct a mechanism that enables Alice to
provide a key to the gateway that enables the gateway to test
whether the word is a keyword in the email without learning
anything else about the email. The mechanism as public key
encryption with keyword search.
In [4], publish/subscribe systems supports highly scale, many
to many communication among loosely coupled publishers
and subscribers. Modern publish/subscribe systems perform
message routing based on the messages related to their
subscriptions and the current context. However, both content
and context encode sensitive information which should be
protected from third party brokers that make routing decisions.
The approach assures the confidentiality of the message being
published and subscriptions being issued while allowing the
brokers to make routing decisions without decrypting
individual messages and subscriptions. Further, subscribers
with a frequently changing context such as location are able to
issue and update subscriptions without revealing the
subscriptions in plaintext to the broker and without the need to
contact a trusted third party for each subscription change
resulting from a change in the context.
In [5], the more sensitive data is shared and stored by third
party on the internet, there will be a need to encrypt data
stored at these sites. One drawback of encrypting data is that it
can be selectively shared only at a coarse-grained level. To
develop a new cryptosystem for fine-grained sharing of
encrypted data we call key-policy attribute-based encryption.
In cryptosystem, cipher texts are labeled with sets of attributes
and private keys are associated with access structures that
control which cipher texts a user is able to decrypt.
In [6], a content centric privacy scheme for information centric
networking is able to support data confidentiality by
introducing attribute-based encryption into ICN and making it
SYSTEM ARCHITECTURE
Client s/m
1
Client s/m 2
Brokerless
pub/sub
system
on web
server
Cloud
storage
N/W
Client s/m n
DB
_______________________________________________________________________________________
ISSN: 2321-8169
3433 - 3435
_______________________________________________________________________________________________
between the publisher and subscriber. Publisher will store the
file in proxy server and accessed by authorized subscriber.
Publisher specify the access policy for each file, access policy
are set using domain attribute and sub-domain attribute.
Suppose the subscriber wants to download any file, first has to
select the file from the list and the system ask for the access
key, after system getting the access key it will separate the
attribute set from the key and check for the access rights, if the
user has the access can download the encrypted file which in
turn decrypted using decryption key and download to the
subscriber local system.
V.
[4]
[5]
[6]
[7]
ACKNOWLEDGEMENT
[3]
CONCLUSION
[2]
[8]
[9]
[10]
3435
IJRITCC | May 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________