Enhancing Security Of Publish/Subscribe System Using Identity Based Encryption Model
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: In a content based publish subscribe system providing security related to the events or messages and subscriptions is very difficult. This paper presents approach to provide security in a Broker-less Publish/Subscribe system by using identity based encryption (IBE) model. The main concept of such systems isto share the secured data on any distributed systems. Identification is very important mechanism in content based publish/subscribe system. Here we provide 1) idea of identity base encryption (IBE) 2) Provision of security in the content based publish/subscribe system .3) Creation of public and private keys for the users of the systems that is for the publishers and subscribers.
Authors and Affiliations
Shital S. Biradar , Prof. Sushilkumar N. Holambe
The Theoretical Analysis of Experimental Research
Abstract: Among the various research methods, the experiment is particularly suitable for cause and effect relationships. Through observation one finds many things that occur together, but observation alone cannot determ...
Implementation of Network Security in Mobile AD-HOC Networks using Multilevel Encryption Techniques
When we are sending a secret information fromsource to destination over a wireless network, safe and secure transmission is a critical issue. An ad-hoc network is a set of wireless nodes and any type of central control o...
Challenges of Interactive Multimedia Data Mining in Social andBehavioral Studies for latest Computing &Communication of anIdeal Applications
Abstract: Now a day’s entire world became a single village because due to the technology of computer scienceit brings whole globe peoples in front of each other on a single place like a village another thing comput...
Continuous Testing of Service-Oriented ApplicationsUsing Service Virtualization
Abstract: Service-Oriented Architecture (SOA) has changed the way business enterprises get aligned withtechnology with a very fast pace keeping the demand of re-alignment time very short. Service-orientedarchitectu...
Contrast Study of Social Engineering Techniques
Abstract: Social engineering has become a menace in our virtual world and is an effectual way to attack our systems. The objective of this study is to discuss different existing social engineering techniques and aspects...