Multi Credential Routing a New Event Dissemination Strategy Which Strengthens The Weak Subscription Confidentiality
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
The provisioning of basic safety devices such as authentication and confidentiality is extremely challenging in a content based publish/subscribe system. Authentication of publishers and subscribers is not easy to get due to the loose coupling of publishers and subscribers. We also present extensions of the cryptographic methods to offer proficient routing of encrypted events by using the idea of searchable encryption. “Multi credential routing” a new event dissemination policy which braces the weak subscription confidentiality, and a thorough breakdown of different attacks on subscription confidentiality. Published events are routed to their appropriate subscribers, without the publishers knowing the relevant set of subscribers, or vice versa. This decoupling is conventionally ensured by intermediate routing over a broker network. In more recent systems, publishers and subscribers organize themselves in a broker-less routing infrastructure, shape an event forwarding overlay.
Authors and Affiliations
Jyothi Vepada, D. Srinivas
Identifying Misuse of Data In Cloud
Cloud Storage Enables Users To Store Their Data Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protecti...
A Novel Technique for Creative Problem-Solving by using Q-learning and Association algorithm
for a single problem there are multiple solutions or multiple ideas from different users. Means every one gave an idea (solution) for solving the given problem if we distribute that particular problem to the different...
Study on Business Process Reengineering(BPR) and its importance in ERP Implementation
In the new era of automation in the industrial growth the ERP plays vital role. Most of the industries struggle to steady their business as much as automatic at the level of functioning environment. The ERP is the one...
Protective Speculation Clouds With Valuable Cost
In this paper, we propose Protective Speculation Clouds With Valuable Cost constraint based approach to identify which datasets need to be encrypted and which do not, so that privacy preserving cost can be saved whil...
Design and Development of Multitasking Robot
A method for integrating real time obstacle avoidance capability in two-legged walking robots i.e.Biped using parallel leg mechanism. Elaborating the way of different task assign to a robot i.e., introducing a multit...