SlideShare a Scribd company logo
SECURING BROKERLESS PUBLISH/SUBSCRIBE SYSTEMS 
USING IDENTITY BASED ENCRYPTION 
ABSTRACT 
The provisioning of basic security mechanisms such as authentication and 
confidentiality is highly challenging in a content based publish/subscribe system. 
Authentication of publishers and subscribers is difficult to achieve due to the loose 
coupling of publishers and subscribers. Likewise, confidentiality of events and 
subscriptions conflicts with content-based routing. This paper presents a novel approach 
to provide confidentiality and authentication in a broker-less content-based 
publish/subscribe system. The authentication of publishers and subscribers as well as 
confidentiality of events is ensured, by adapting the pairing-based cryptography 
mechanisms, to the needs of a publish/subscribe system. Furthermore, an algorithm to 
cluster subscribers according to their subscriptions preserves a weak notion of 
subscription confidentiality. In addition to our previous work this paper contributes 1) use 
of searchable encryption to enable efficient routing of encrypted events, 2) 
multicredential routing a new event dissemination strategy to strengthen the weak 
subscription confidentiality, and 3) thorough analysis of different attacks on subscription 
confidentiality. The overall approach provides fine-grained key management and the cost 
for encryption, decryption, and routing is in the order of subscribed attributes. Moreover, 
the evaluations show that providing security is affordable w.r.t. 1) throughput of the 
proposed cryptographic primitives, and 2) delays incurred during the construction of the 
publish/subscribe overlay and the event dissemination. 
EXISTING SYSTEM: 
In the past, most research has focused only on providing expressive and scalable 
pub/sub systems, but little attention has been paid for the need of security. Existing 
approaches toward secure pub/sub systems mostly rely on the presence of a traditional 
broker network. These either address security under restricted expressiveness, for 
example, by using only keyword matching for routing events or rely on a network of 
(semi-)trusted brokers. Furthermore, existing approaches use coarse-grain epoch based
key management and cannot provide fine-grain access control in a scalable manner. 
Nevertheless, security in broker-less pub/sub systems, where the subscribers are clustered 
according to their subscriptions, has not been discussed yet in the literature. 
PROPOSED SYSTEM: 
Proposed System presents a new approach to provide authentication and 
confidentiality in a broker-less pub/sub system. Our approach allow subscribers 
to maintain credentials according to their subscriptions. Private keys assigned to the 
subscribers are labeled with the credentials. A publisher associates each encrypted event 
with a set of credentials. We adapted identity-based encryption (IBE) mechanisms 1) to 
ensure that a particular subscriber can decrypt an event only if there is a match between 
the credentials associated with the event and the key; and 2) to allow subscribers to verify 
the authenticity of received events. Furthermore, we address the issue of subscription 
confidentiality in the presence of semantic clustering of subscribers. A weaker notion of 
subscription confidentiality is defined and a secure overlay maintenance protocol is 
designed to preserve the weak subscription confidentiality. 
PROBLEM STATEMENT: 
It include two entities in the system: publishers and subscribers. Both the entities 
are computationally bounded and do not trust each other. Moreover, all the peers 
(publishers or subscribers) participating in the pub/sub overlay network are honest and do 
not deviate from the designed protocol. Likewise, authorized publishers only disseminate 
valid events in the system. However, malicious publishers may masquerade the 
authorized publishers and spam the overlay network with fake and duplicate events. We 
do not intend to solve the digital copyright problem; therefore, authorized subscribers do 
not reveal the content of successfully decrypted events to other subscribers. 
SCOPE: 
The pub/sub overlay proposed is similar to DPS system with modifications to 
ensure subscription confidentiality. In this paper, we, therefore, evaluate performance and 
scalability of the proposed pub/sub system only with respect to the security mechanisms 
and omit other aspects. In particular, we evaluate the performance of our system the 
overlay construction time and the event dissemination delays. We measure the average
delay experienced by each subscriber to connect to a suitable position in an attribute tree. 
Delay is measured from the time a subscriber sends connection request message to a 
random peer in the tree till the time the connection is actually established. The 
evaluations are performed only for a single attribute tree. It shows that the average 
connection time (delay) increases with the number of peers in the system because of the 
increase in the height of the attribute tree (each new hop increases the network delay as 
well as time to apply security methods). 
MODULE DESCRIPTION: 
Number of Modules 
After careful analysis the system has been identified to have the following modules: 
1. Content-Based Publish/Subcriber Module. 
2. Identity Based Encryption Module. 
3. Key Generation for Publisher/Subscriber Module. 
4. Secure Overlay Maintenance Module. 
1.Content-Based Publish/Subscriber Module: 
The routing of events from publishers to the relevant subscribers, we use the content-based 
data model. We consider pub/sub in a setting where there exists no dedicated 
broker infrastructure. Publishers and subscribers contribute as peers to the maintenance of 
a self-organizing overlay structure. To authenticate publishers, we use the concept of 
advertisements in which a publisher announces beforehand the set of events which it 
intends to publish. 
2.Identity Based Encryption Module: 
In our approach, publishers and subscribers interact with a key server. They provide 
credentials to the key server and in turn receive keys which fit the expressed capabilities 
in the credentials. Subsequently, those keys can be used to encrypt, decrypt, and sign 
relevant messages in the content based pub/sub system, i.e., the credential becomes 
authorized by the key server. The keys assigned to publishers and subscribers, and the
ciphertexts, are labeled with credentials. In particular, the identity-based encryption 
ensures that a particular key can decrypt a particular ciphertext only if there is a match 
between the credentials of the ciphertext and the key. Publishers and subscribers maintain 
separate private keys for each authorized credential. 
3. Key Generation For Publisher/Subscriber Module: 
Publisher keys: Before starting to publish events, a publisher contacts the key server 
along with the credentials for each attribute in its advertisement. If the publisher is 
allowed to publish events according to its credentials, the key server will generate 
separate private keys for each credential. The public key of a publisher p for credential is 
generated. 
Subscriber keys: Similarly, to receive events matching its subscription, a subscriber 
should contact the key server and receive the private keys for the credentials associated 
with each attribute A. 
4.Secure Overlay Maintenance Module: 
The secure overlay maintenance protocol is based on the idea that in the tree, subscribers 
are always connected according to the containment relationship between their credential. 
A new subscriber s generates a random key SW and encrypts it with the public keys for 
all credentials that cover its own credential, for example, a subscriber with credential will 
generate ciphertexts by applying the public keys. The generated cipher texts are added to 
a connection request (CR) and the request is forwarded to a random peer in the tree. A 
connection is established if the peer can decrypt any of the cipher text using its private 
keys.
SOFTWARE REQUIREMENTS: 
Operating System : Windows 
Technology : Java and J2EE 
Web Technologies : Html, JavaScript, CSS 
IDE : My Eclipse 
Web Server : Tomcat 
Tool kit : Android Phone 
Database : My SQL 
Java Version : J2SDK1.5 
HARDWARE REQUIREMENTS: 
Hardware : Pentium 
Speed : 1.1 GHz 
RAM : 1GB 
Hard Disk : 20 GB 
Floppy Drive : 1.44 MB 
Key Board : Standard Windows Keyboard 
Mouse : Two or Three Button Mouse 
Monitor : SVGA

More Related Content

PPTX
Securing broker less publish subscribe systems using identity-based encryption
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
PDF
Securing broker less publish subscribe systems using identity-based encryption
PDF
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
PDF
An Introduction to Authentication for Applications
PDF
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
PDF
IRJET- Password Management Kit for Secure Authentication
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Securing broker less publish subscribe systems using identity-based encryption
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
Securing broker less publish subscribe systems using identity-based encryption
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
An Introduction to Authentication for Applications
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
IRJET- Password Management Kit for Secure Authentication
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)

What's hot (17)

PDF
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
PDF
Jdbc 6
DOC
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
PPT
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
PDF
Network security unit 1,2,3
PDF
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
PDF
A novel paradigm in authentication system
DOCX
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
PPTX
Digital signatures and e-Commerce
DOCX
Identity based proxy-oriented data uploading and remote data integrity checki...
PDF
Security Basics
PDF
Identity based proxy-oriented data uploading and remote data integrity checki...
PDF
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
DOCX
PPT
Ch01
 
PDF
Security Analysis and Improvement for IEEE 802.11i
DOC
documentation for identity based secure distrbuted data storage schemes
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
Jdbc 6
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Network security unit 1,2,3
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
A novel paradigm in authentication system
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
Digital signatures and e-Commerce
Identity based proxy-oriented data uploading and remote data integrity checki...
Security Basics
Identity based proxy-oriented data uploading and remote data integrity checki...
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Ch01
 
Security Analysis and Improvement for IEEE 802.11i
documentation for identity based secure distrbuted data storage schemes
Ad

Viewers also liked (13)

DOC
LOCAWARD A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM
DOCX
Security evaluation of pattern classifiers under attack
DOCX
Tradeoff between reliability and security in multiple access relay networks u...
PDF
Oruta privacy preserving public auditing for shared data in the cloud1
PDF
Building confidential and efficient query services in the cloud with rasp dat...
DOC
Efficient instant fuzzy search with proximity ranking
PDF
Xs path navigation on xml schemas made easy
PDF
Dealing with concept drifts in process mining
PDF
Efficient authentication for mobile and pervasive computing
DOC
On false data injection attacks against power system
PDF
Mining weakly labeled web facial images for search based face annotation
DOCX
Cooperative caching for efficient data access in
PDF
Shakas project titles 2014 2015
LOCAWARD A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM
Security evaluation of pattern classifiers under attack
Tradeoff between reliability and security in multiple access relay networks u...
Oruta privacy preserving public auditing for shared data in the cloud1
Building confidential and efficient query services in the cloud with rasp dat...
Efficient instant fuzzy search with proximity ranking
Xs path navigation on xml schemas made easy
Dealing with concept drifts in process mining
Efficient authentication for mobile and pervasive computing
On false data injection attacks against power system
Mining weakly labeled web facial images for search based face annotation
Cooperative caching for efficient data access in
Shakas project titles 2014 2015
Ad

Similar to Securing broker less publish subscribe systems using identity-based encryption (20)

DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
DOCX
securing broker-less publish subscribe systems using identity-based encryption
PDF
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
DOCX
Securing broker less publish subscribe systems using identity-based encryption
PDF
IRJET - Protecting Investors Privacy in Online Trading System
PDF
P01813101103
PDF
H0362052056
DOCX
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
DOCX
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
PPTX
Attribute-Based Encryption for Cloud Security
PPT
Mutual Authentication For Wireless Communication
DOCX
Anonymity based privacy-preserving data
PPTX
17. Service Operator-aware Trust Scheme for Resource Matchmaking across Multi...
PDF
Access Policy Management For OSN Using Network Relationships
PDF
13 ijcse-01233
PPTX
CLOUD SECURITY MECHANSMS - Unit 4 - This course will enable the students to l...
PDF
Authentication and Authorization Models
PDF
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
PDF
Kerberos Security in Distributed Systems
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
securing broker-less publish subscribe systems using identity-based encryption
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Securing broker less publish subscribe systems using identity-based encryption
IRJET - Protecting Investors Privacy in Online Trading System
P01813101103
H0362052056
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
Attribute-Based Encryption for Cloud Security
Mutual Authentication For Wireless Communication
Anonymity based privacy-preserving data
17. Service Operator-aware Trust Scheme for Resource Matchmaking across Multi...
Access Policy Management For OSN Using Network Relationships
13 ijcse-01233
CLOUD SECURITY MECHANSMS - Unit 4 - This course will enable the students to l...
Authentication and Authorization Models
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Kerberos Security in Distributed Systems

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Securing broker less publish subscribe systems using identity-based encryption

  • 1. SECURING BROKERLESS PUBLISH/SUBSCRIBE SYSTEMS USING IDENTITY BASED ENCRYPTION ABSTRACT The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content based publish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based routing. This paper presents a novel approach to provide confidentiality and authentication in a broker-less content-based publish/subscribe system. The authentication of publishers and subscribers as well as confidentiality of events is ensured, by adapting the pairing-based cryptography mechanisms, to the needs of a publish/subscribe system. Furthermore, an algorithm to cluster subscribers according to their subscriptions preserves a weak notion of subscription confidentiality. In addition to our previous work this paper contributes 1) use of searchable encryption to enable efficient routing of encrypted events, 2) multicredential routing a new event dissemination strategy to strengthen the weak subscription confidentiality, and 3) thorough analysis of different attacks on subscription confidentiality. The overall approach provides fine-grained key management and the cost for encryption, decryption, and routing is in the order of subscribed attributes. Moreover, the evaluations show that providing security is affordable w.r.t. 1) throughput of the proposed cryptographic primitives, and 2) delays incurred during the construction of the publish/subscribe overlay and the event dissemination. EXISTING SYSTEM: In the past, most research has focused only on providing expressive and scalable pub/sub systems, but little attention has been paid for the need of security. Existing approaches toward secure pub/sub systems mostly rely on the presence of a traditional broker network. These either address security under restricted expressiveness, for example, by using only keyword matching for routing events or rely on a network of (semi-)trusted brokers. Furthermore, existing approaches use coarse-grain epoch based
  • 2. key management and cannot provide fine-grain access control in a scalable manner. Nevertheless, security in broker-less pub/sub systems, where the subscribers are clustered according to their subscriptions, has not been discussed yet in the literature. PROPOSED SYSTEM: Proposed System presents a new approach to provide authentication and confidentiality in a broker-less pub/sub system. Our approach allow subscribers to maintain credentials according to their subscriptions. Private keys assigned to the subscribers are labeled with the credentials. A publisher associates each encrypted event with a set of credentials. We adapted identity-based encryption (IBE) mechanisms 1) to ensure that a particular subscriber can decrypt an event only if there is a match between the credentials associated with the event and the key; and 2) to allow subscribers to verify the authenticity of received events. Furthermore, we address the issue of subscription confidentiality in the presence of semantic clustering of subscribers. A weaker notion of subscription confidentiality is defined and a secure overlay maintenance protocol is designed to preserve the weak subscription confidentiality. PROBLEM STATEMENT: It include two entities in the system: publishers and subscribers. Both the entities are computationally bounded and do not trust each other. Moreover, all the peers (publishers or subscribers) participating in the pub/sub overlay network are honest and do not deviate from the designed protocol. Likewise, authorized publishers only disseminate valid events in the system. However, malicious publishers may masquerade the authorized publishers and spam the overlay network with fake and duplicate events. We do not intend to solve the digital copyright problem; therefore, authorized subscribers do not reveal the content of successfully decrypted events to other subscribers. SCOPE: The pub/sub overlay proposed is similar to DPS system with modifications to ensure subscription confidentiality. In this paper, we, therefore, evaluate performance and scalability of the proposed pub/sub system only with respect to the security mechanisms and omit other aspects. In particular, we evaluate the performance of our system the overlay construction time and the event dissemination delays. We measure the average
  • 3. delay experienced by each subscriber to connect to a suitable position in an attribute tree. Delay is measured from the time a subscriber sends connection request message to a random peer in the tree till the time the connection is actually established. The evaluations are performed only for a single attribute tree. It shows that the average connection time (delay) increases with the number of peers in the system because of the increase in the height of the attribute tree (each new hop increases the network delay as well as time to apply security methods). MODULE DESCRIPTION: Number of Modules After careful analysis the system has been identified to have the following modules: 1. Content-Based Publish/Subcriber Module. 2. Identity Based Encryption Module. 3. Key Generation for Publisher/Subscriber Module. 4. Secure Overlay Maintenance Module. 1.Content-Based Publish/Subscriber Module: The routing of events from publishers to the relevant subscribers, we use the content-based data model. We consider pub/sub in a setting where there exists no dedicated broker infrastructure. Publishers and subscribers contribute as peers to the maintenance of a self-organizing overlay structure. To authenticate publishers, we use the concept of advertisements in which a publisher announces beforehand the set of events which it intends to publish. 2.Identity Based Encryption Module: In our approach, publishers and subscribers interact with a key server. They provide credentials to the key server and in turn receive keys which fit the expressed capabilities in the credentials. Subsequently, those keys can be used to encrypt, decrypt, and sign relevant messages in the content based pub/sub system, i.e., the credential becomes authorized by the key server. The keys assigned to publishers and subscribers, and the
  • 4. ciphertexts, are labeled with credentials. In particular, the identity-based encryption ensures that a particular key can decrypt a particular ciphertext only if there is a match between the credentials of the ciphertext and the key. Publishers and subscribers maintain separate private keys for each authorized credential. 3. Key Generation For Publisher/Subscriber Module: Publisher keys: Before starting to publish events, a publisher contacts the key server along with the credentials for each attribute in its advertisement. If the publisher is allowed to publish events according to its credentials, the key server will generate separate private keys for each credential. The public key of a publisher p for credential is generated. Subscriber keys: Similarly, to receive events matching its subscription, a subscriber should contact the key server and receive the private keys for the credentials associated with each attribute A. 4.Secure Overlay Maintenance Module: The secure overlay maintenance protocol is based on the idea that in the tree, subscribers are always connected according to the containment relationship between their credential. A new subscriber s generates a random key SW and encrypts it with the public keys for all credentials that cover its own credential, for example, a subscriber with credential will generate ciphertexts by applying the public keys. The generated cipher texts are added to a connection request (CR) and the request is forwarded to a random peer in the tree. A connection is established if the peer can decrypt any of the cipher text using its private keys.
  • 5. SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Tool kit : Android Phone Database : My SQL Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: Hardware : Pentium Speed : 1.1 GHz RAM : 1GB Hard Disk : 20 GB Floppy Drive : 1.44 MB Key Board : Standard Windows Keyboard Mouse : Two or Three Button Mouse Monitor : SVGA