SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Securing Brokerless Publish/SubscribeSystems 
Using Identity Based Encryption 
ABSTRACT 
The provisioning of basic security mechanisms such as authentication and 
confidentiality is highly challenging in a contentbasedpublish/subscribe system. 
Authentication of publishers and subscribers is difficult to achieve due to the 
loose coupling ofpublishers and subscribers. Likewise, confidentiality of events 
and subscriptions conflicts with content-based routing. This paperpresents a 
novel approach to provide confidentiality and authentication in a broker-less 
content-based publish/subscribe system. Theauthentication of publishers and 
subscribers as well as confidentiality of events is ensured, by adapting the 
pairing-based cryptographymechanisms, to the needs of a publish/subscribe 
system. Furthermore, an algorithm to cluster subscribers according to 
theirsubscriptions preserves a weak notion of subscription confidentiality. In 
addition to our previous work this paper contributes 1) useof searchable 
encryption to enable efficient routing of encrypted events, 2) multicredential 
routing a new event dissemination strategy to strengthen the weak subscription 
confidentiality, and 3) thorough analysis of different attacks on subscription 
confidentiality. Theoverall approach provides fine-grained key management and
the cost for encryption, decryption, and routing is in the order ofsubscribed 
attributes. Moreover, the evaluations show that providing security is affordable 
w.r.t. 1) throughput of the proposedcryptographic primitives, and 2) delays 
incurred during the construction of the publish/subscribe overlay and the event 
dissemination. 
EXISTING SYSTEM: 
In the past, most research has focused only on providingexpressive and scalable 
pub/sub systems, but little attentionhas been paid for the need of security. 
Existingapproaches toward secure pub/sub systems mostly relyon the presence 
of a traditional broker network. These either address security underrestricted 
expressiveness, for example, by using onlykeyword matching for routing events 
or rely ona network of (semi-)trusted brokers.Furthermore, existing approaches 
use coarse-grain epochbasedkey management and cannot provide fine-grainaccess 
control in a scalable manner. Nevertheless, security in broker-less 
pub/sub systems, where the subscribersare clustered according to their 
subscriptions, hasnot been discussed yet in the literature. 
PROPOSED SYSTEM: 
Proposed System presents a newapproach to provide authentication and 
confidentiality in abroker-less pub/sub system. Our approach allow subscribers 
to maintain credentials according to their subscriptions.Private keys assigned to 
the subscribers are labeledwith the credentials. A publisher associates each 
encryptedevent with a set of credentials. We adapted identity-basedencryption 
(IBE) mechanisms 1) to ensure that aparticular subscriber can decrypt an event 
only if there is amatch between the credentials associated with the eventand the 
key; and 2) to allow subscribers to verify theauthenticity of received events. 
Furthermore, we addressthe issue of subscription confidentiality in the presence 
ofsemantic clustering of subscribers. A weaker notion ofsubscription
confidentiality is defined and a secure overlaymaintenance protocol is designed 
to preserve the weaksubscription confidentiality. 
PROBLEM STATEMENT: 
It include two entities in thesystem: publishers and subscribers. Both the entities are 
computationally bounded and do not trust each other.Moreover, all the peers (publishers 
or subscribers) participatingin the pub/sub overlay network are honest and donot deviate 
from the designed protocol. Likewise, authorizedpublishers only disseminate valid events 
in the system.However, malicious publishers may masquerade theauthorized publishers 
and spam the overlay network withfake and duplicate events. We do not intend to solve 
thedigital copyright problem; therefore, authorized subscribersdo not reveal the content 
of successfully decrypted events toother subscribers. 
SCOPE: 
The pub/sub overlay proposed is similar to DPS system with modifications to 
ensure subscriptionconfidentiality. In this paper, we, therefore, 
evaluateperformance and scalability of the proposed pub/subsystem only with 
respect to the security mechanisms andomit other aspects. In particular, we 
evaluate the performance of our system the overlay construction timeand the 
event dissemination delays. We measure the average delay experienced byeach 
subscriber to connect to a suitable position in anattribute tree. Delay is measured 
from the time a subscribersends connection request message to a random peer in 
thetree till the time the connection is actually established. Theevaluations are 
performed only for a single attribute tree. It shows that the average connection 
time (delay)increases with the number of peers in the system because ofthe 
increase in the height of the attribute tree (each new hopincreases the network 
delay as well as time to applysecurity methods). 
MODULE DESCRIPTION:
Number of Modules 
After careful analysis the system has been identified to have the following 
modules: 
1. Content-Based Publish/Subcriber Module. 
2. Identity Based Encryption Module. 
3. Key Generation for Publisher/Subscriber Module. 
4. Secure Overlay MaintenanceModule. 
1.Content-Based Publish/SubscriberModule: 
The routing of events from publishers to the relevantsubscribers, we use the 
content-based data model. We consider pub/sub in a setting where there exists 
no dedicated broker infrastructure. Publishers and subscribers contribute as 
peers to the maintenance of a self-organizing overlay structure. To authenticate 
publishers, we use the concept of advertisements in which a publisher announces 
beforehand the set of events which it intends to publish. 
2.Identity Based Encryption Module: 
In our approach, publishers and subscribers interact with a key server. They 
provide credentials to the key server and in turn receive keys which fit the 
expressed capabilities in the credentials. Subsequently, those keys can be used to 
encrypt, decrypt, and sign relevant messages in the content based pub/sub 
system, i.e., the credential becomes authorized by the key server. The keys 
assigned to publishers and subscribers, and theciphertexts, are labeled with 
credentials. In particular, theidentity-based encryption ensures that a particular 
key candecrypt a particular ciphertext only if there is a matchbetween the
credentials of the ciphertext and the key.Publishers and subscribers maintain 
separate private keysfor each authorized credential. 
3.Key Generation For Publisher/SubscriberModule: 
Publisher keys: Before starting to publish events, a publishercontacts the key 
server along with the credentials for eachattribute in its advertisement. If the 
publisher is allowed topublish events according to its credentials, the key 
serverwill generate separate private keys for each credential. The public key of a 
publisher p for credentialis generated. 
Subscriber keys:Similarly, to receive events matching itssubscription, a 
subscriber should contact the key server andreceive the private keys for the 
credentials associated witheach attribute A. 
4.Secure Overlay MaintenanceModule: 
The secure overlay maintenance protocol is based on theidea that in the tree, 
subscribers are always connectedaccording to the containment relationship 
between theircredential. A new subscriber s generates a random key SW 
andencrypts it with the public keysfor all credentials thatcover its own 
credential, for example, a subscriber with credential will generate ciphertexts by 
applying thepublic keys. The generated cipher texts areadded to a connection 
request (CR) and the request isforwarded to a random peer in the tree. A 
connection isestablished if the peer can decrypt any of the cipher text using its 
private keys. 
SOFTWARE REQUIREMENTS: 
Operating System : Windows 
Technology : Java and J2EE
Web Technologies : Html, JavaScript, CSS 
IDE : My Eclipse 
Web Server : Tomcat 
Tool kit: Android Phone 
Database : My SQL 
Java Version : J2SDK1.5 
HARDWARE REQUIREMENTS: 
Hardware : Pentium 
Speed : 1.1 GHz 
RAM : 1GB 
Hard Disk : 20 GB 
Floppy Drive : 1.44 MB 
Key Board : Standard Windows Keyboard 
Mouse : Two or Three Button Mouse 
Monitor : SVGA

More Related Content

What's hot (16)

DOCX
Access policy consolidation for event processing systems
IEEEFINALYEARPROJECTS
 
DOCX
Access policy consolidation for event processing systems
IEEEFINALYEARPROJECTS
 
PDF
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
PPTX
Cross domain security reference architecture
Wen Zhu
 
PDF
An Introduction to Authentication for Applications
Ubisecure
 
PDF
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
 
PPT
Ch01
n C
 
PDF
Connection String Parameter Pollution Attacks
Chema Alonso
 
DOCX
Cam cloud assisted privacy preserving mobile health monitoring
IEEEFINALYEARPROJECTS
 
PDF
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
IJERA Editor
 
PDF
Security issues in grid computing
ijcsa
 
PDF
An improvement to trust based cross layer security protocol against sybil att...
Alexander Decker
 
PPT
Certificates and Web of Trust
Yousof Alsatom
 
PDF
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
PDF
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
Access policy consolidation for event processing systems
IEEEFINALYEARPROJECTS
 
Access policy consolidation for event processing systems
IEEEFINALYEARPROJECTS
 
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
Cross domain security reference architecture
Wen Zhu
 
An Introduction to Authentication for Applications
Ubisecure
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
 
Ch01
n C
 
Connection String Parameter Pollution Attacks
Chema Alonso
 
Cam cloud assisted privacy preserving mobile health monitoring
IEEEFINALYEARPROJECTS
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
IJERA Editor
 
Security issues in grid computing
ijcsa
 
An improvement to trust based cross layer security protocol against sybil att...
Alexander Decker
 
Certificates and Web of Trust
Yousof Alsatom
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 

Viewers also liked (8)

DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Secure outsourced-attribute-base...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS The client assignment problem fo...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Rre a-game-theoretic-intrusion-r...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Web service recommendation via e...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET DATA MINING PROJECTS Ai and opinion mining
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Secure outsourced-attribute-base...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS The client assignment problem fo...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Rre a-game-theoretic-intrusion-r...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Web service recommendation via e...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET DATA MINING PROJECTS Ai and opinion mining
IEEEMEMTECHSTUDENTPROJECTS
 
Ad

Similar to IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subscribesystemsusing identity based encryption (20)

PDF
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
 
DOCX
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
PDF
IRJET - Protecting Investors Privacy in Online Trading System
IRJET Journal
 
PDF
P01813101103
IOSR Journals
 
PPTX
Attribute-Based Encryption for Cloud Security
Mphasis
 
PDF
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Editor IJMTER
 
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
IEEEFINALYEARPROJECTS
 
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Yashwanth Reddy
 
PDF
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
PDF
Access Policy Management For OSN Using Network Relationships
IJMTST Journal
 
PDF
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
IJCERT JOURNAL
 
PDF
13 ijcse-01233
Shivlal Mewada
 
PDF
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
PDF
H0362052056
inventionjournals
 
DOCX
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
JAYAPRAKASH JPINFOTECH
 
DOCX
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
JAYAPRAKASH JPINFOTECH
 
PDF
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
IRJET Journal
 
DOC
Service operator aware trust scheme for resource
jayaramb
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
 
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
IRJET - Protecting Investors Privacy in Online Trading System
IRJET Journal
 
P01813101103
IOSR Journals
 
Attribute-Based Encryption for Cloud Security
Mphasis
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Editor IJMTER
 
Scalable and secure sharing of personal health records in cloud computing usi...
IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Yashwanth Reddy
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
Access Policy Management For OSN Using Network Relationships
IJMTST Journal
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
IJCERT JOURNAL
 
13 ijcse-01233
Shivlal Mewada
 
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
H0362052056
inventionjournals
 
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
JAYAPRAKASH JPINFOTECH
 
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
JAYAPRAKASH JPINFOTECH
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
IRJET Journal
 
Service operator aware trust scheme for resource
jayaramb
 
Ad

More from IEEEMEMTECHSTUDENTPROJECTS (20)

DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEEMEMTECHSTUDENTPROJECTS
 
DOC
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET DATA MINING PROJECTS Web image re ranking using query-specif...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET DATA MINING PROJECTS Web image re ranking using query-specif...
IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEEMEMTECHSTUDENTPROJECTS
 

Recently uploaded (20)

PPTX
Green Building & Energy Conservation ppt
Sagar Sarangi
 
PPTX
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PPTX
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PPTX
Benefits_^0_Challigi😙🏡💐8fenges[1].pptx
akghostmaker
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PPTX
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 
Green Building & Energy Conservation ppt
Sagar Sarangi
 
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Benefits_^0_Challigi😙🏡💐8fenges[1].pptx
akghostmaker
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 

IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subscribesystemsusing identity based encryption

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected] Securing Brokerless Publish/SubscribeSystems Using Identity Based Encryption ABSTRACT The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a contentbasedpublish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling ofpublishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based routing. This paperpresents a novel approach to provide confidentiality and authentication in a broker-less content-based publish/subscribe system. Theauthentication of publishers and subscribers as well as confidentiality of events is ensured, by adapting the pairing-based cryptographymechanisms, to the needs of a publish/subscribe system. Furthermore, an algorithm to cluster subscribers according to theirsubscriptions preserves a weak notion of subscription confidentiality. In addition to our previous work this paper contributes 1) useof searchable encryption to enable efficient routing of encrypted events, 2) multicredential routing a new event dissemination strategy to strengthen the weak subscription confidentiality, and 3) thorough analysis of different attacks on subscription confidentiality. Theoverall approach provides fine-grained key management and
  • 2. the cost for encryption, decryption, and routing is in the order ofsubscribed attributes. Moreover, the evaluations show that providing security is affordable w.r.t. 1) throughput of the proposedcryptographic primitives, and 2) delays incurred during the construction of the publish/subscribe overlay and the event dissemination. EXISTING SYSTEM: In the past, most research has focused only on providingexpressive and scalable pub/sub systems, but little attentionhas been paid for the need of security. Existingapproaches toward secure pub/sub systems mostly relyon the presence of a traditional broker network. These either address security underrestricted expressiveness, for example, by using onlykeyword matching for routing events or rely ona network of (semi-)trusted brokers.Furthermore, existing approaches use coarse-grain epochbasedkey management and cannot provide fine-grainaccess control in a scalable manner. Nevertheless, security in broker-less pub/sub systems, where the subscribersare clustered according to their subscriptions, hasnot been discussed yet in the literature. PROPOSED SYSTEM: Proposed System presents a newapproach to provide authentication and confidentiality in abroker-less pub/sub system. Our approach allow subscribers to maintain credentials according to their subscriptions.Private keys assigned to the subscribers are labeledwith the credentials. A publisher associates each encryptedevent with a set of credentials. We adapted identity-basedencryption (IBE) mechanisms 1) to ensure that aparticular subscriber can decrypt an event only if there is amatch between the credentials associated with the eventand the key; and 2) to allow subscribers to verify theauthenticity of received events. Furthermore, we addressthe issue of subscription confidentiality in the presence ofsemantic clustering of subscribers. A weaker notion ofsubscription
  • 3. confidentiality is defined and a secure overlaymaintenance protocol is designed to preserve the weaksubscription confidentiality. PROBLEM STATEMENT: It include two entities in thesystem: publishers and subscribers. Both the entities are computationally bounded and do not trust each other.Moreover, all the peers (publishers or subscribers) participatingin the pub/sub overlay network are honest and donot deviate from the designed protocol. Likewise, authorizedpublishers only disseminate valid events in the system.However, malicious publishers may masquerade theauthorized publishers and spam the overlay network withfake and duplicate events. We do not intend to solve thedigital copyright problem; therefore, authorized subscribersdo not reveal the content of successfully decrypted events toother subscribers. SCOPE: The pub/sub overlay proposed is similar to DPS system with modifications to ensure subscriptionconfidentiality. In this paper, we, therefore, evaluateperformance and scalability of the proposed pub/subsystem only with respect to the security mechanisms andomit other aspects. In particular, we evaluate the performance of our system the overlay construction timeand the event dissemination delays. We measure the average delay experienced byeach subscriber to connect to a suitable position in anattribute tree. Delay is measured from the time a subscribersends connection request message to a random peer in thetree till the time the connection is actually established. Theevaluations are performed only for a single attribute tree. It shows that the average connection time (delay)increases with the number of peers in the system because ofthe increase in the height of the attribute tree (each new hopincreases the network delay as well as time to applysecurity methods). MODULE DESCRIPTION:
  • 4. Number of Modules After careful analysis the system has been identified to have the following modules: 1. Content-Based Publish/Subcriber Module. 2. Identity Based Encryption Module. 3. Key Generation for Publisher/Subscriber Module. 4. Secure Overlay MaintenanceModule. 1.Content-Based Publish/SubscriberModule: The routing of events from publishers to the relevantsubscribers, we use the content-based data model. We consider pub/sub in a setting where there exists no dedicated broker infrastructure. Publishers and subscribers contribute as peers to the maintenance of a self-organizing overlay structure. To authenticate publishers, we use the concept of advertisements in which a publisher announces beforehand the set of events which it intends to publish. 2.Identity Based Encryption Module: In our approach, publishers and subscribers interact with a key server. They provide credentials to the key server and in turn receive keys which fit the expressed capabilities in the credentials. Subsequently, those keys can be used to encrypt, decrypt, and sign relevant messages in the content based pub/sub system, i.e., the credential becomes authorized by the key server. The keys assigned to publishers and subscribers, and theciphertexts, are labeled with credentials. In particular, theidentity-based encryption ensures that a particular key candecrypt a particular ciphertext only if there is a matchbetween the
  • 5. credentials of the ciphertext and the key.Publishers and subscribers maintain separate private keysfor each authorized credential. 3.Key Generation For Publisher/SubscriberModule: Publisher keys: Before starting to publish events, a publishercontacts the key server along with the credentials for eachattribute in its advertisement. If the publisher is allowed topublish events according to its credentials, the key serverwill generate separate private keys for each credential. The public key of a publisher p for credentialis generated. Subscriber keys:Similarly, to receive events matching itssubscription, a subscriber should contact the key server andreceive the private keys for the credentials associated witheach attribute A. 4.Secure Overlay MaintenanceModule: The secure overlay maintenance protocol is based on theidea that in the tree, subscribers are always connectedaccording to the containment relationship between theircredential. A new subscriber s generates a random key SW andencrypts it with the public keysfor all credentials thatcover its own credential, for example, a subscriber with credential will generate ciphertexts by applying thepublic keys. The generated cipher texts areadded to a connection request (CR) and the request isforwarded to a random peer in the tree. A connection isestablished if the peer can decrypt any of the cipher text using its private keys. SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE
  • 6. Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Tool kit: Android Phone Database : My SQL Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: Hardware : Pentium Speed : 1.1 GHz RAM : 1GB Hard Disk : 20 GB Floppy Drive : 1.44 MB Key Board : Standard Windows Keyboard Mouse : Two or Three Button Mouse Monitor : SVGA