Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1
Abstract
In past few years, Web has huge impact on distributed computing. The provisioning of fundamental security mechanisms like authentication and confidentiality for Sender/Receiver System is exceptionally difficult. Authentication of Senders and Receivers is hard to accomplish because of the loosely coupling of Senders and Receivers. Moreover, privacy of events and subscriptions conflicts with content based routing. This paper displays a novel methodology to provide confidentiality and authentication in Sender/Receiver System. By adapting pairing-based cryptography mechanisms, the authentication of Senders and Receivers and additionally confidentiality of events is guaranteed, to the needs of a Sender/Receiver system. Besides, an algorithm to cluster Receivers as respective of their subscriptions protects a weak notion of subscription privacy. There can be some improvements which can be doneto the existing systems [8]. Like 1) utilization of searchable encryption for allowing proficient routing of encrypted events, 2)Exhaustive examination of number of attacks on subscription confidentiality, and 3)Multicredential routing another event dissemination technique to reinforce the weak subscription confidentiality. The general methodology offers fine-grained key management and the expense for encryption, decryption, and routing is in the request of subscribed properties. In addition, the assessments demonstrate that providing security is reasonable with respect to 1) delay brought about amid the development of the Sender/Receiver overlay and the event dissemination,2) Throughput of the presented cryptographic primitives.
Analyzing the Performance of Supply Chain using Topsis
Analyzing the Performance of Supply Chain using Topsis
Performance Modeling of Automotive Sensors and Sensor Interface Systems using Simulink
Performance Modeling of Automotive Sensors and Sensor Interface Systems using Simulink
Survey on Visual Cryptography Schemes
Visual cryptography (VC) is a encryption scheme used to share secret image. It encodes image into n shares. These shares are either printed on transparencies or are encoded and stored in a digital form. The shares can lo...
Biodeterioration of Cotton by Cellulolytic Fungi
Fungal deterioration is a major issue in garment mills; mainly it affects high cellulosic materials like cotton. This study empirically explains the saccharification of cotton by Trichoderma sp., Aspergillus sp., Cladosp...
Using MATLAB Component Object Model with Visual Basic Graphical User Interface (GUI): Application To: One Dimensional Diffusion Heat Transfer Equations of Extended Surface (FINS)
" The main problem objects implementation of all learning projects or labs in the world is the high cost. So all manufacturer companies in the world resort to find other teaching methods which have low cost and more reli...