Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1

Abstract

In past few years, Web has huge impact on distributed computing. The provisioning of fundamental security mechanisms like authentication and confidentiality for Sender/Receiver System is exceptionally difficult. Authentication of Senders and Receivers is hard to accomplish because of the loosely coupling of Senders and Receivers. Moreover, privacy of events and subscriptions conflicts with content based routing. This paper displays a novel methodology to provide confidentiality and authentication in Sender/Receiver System. By adapting pairing-based cryptography mechanisms, the authentication of Senders and Receivers and additionally confidentiality of events is guaranteed, to the needs of a Sender/Receiver system. Besides, an algorithm to cluster Receivers as respective of their subscriptions protects a weak notion of subscription privacy. There can be some improvements which can be doneto the existing systems [8]. Like 1) utilization of searchable encryption for allowing proficient routing of encrypted events, 2)Exhaustive examination of number of attacks on subscription confidentiality, and 3)Multicredential routing another event dissemination technique to reinforce the weak subscription confidentiality. The general methodology offers fine-grained key management and the expense for encryption, decryption, and routing is in the request of subscribed properties. In addition, the assessments demonstrate that providing security is reasonable with respect to 1) delay brought about amid the development of the Sender/Receiver overlay and the event dissemination,2) Throughput of the presented cryptographic primitives.

Authors and Affiliations

Keywords

Related Articles

Comparative Study of Techniques for Edge Detection of Angiogram Images using Classical Image Processing

" In medical image processing, blood vessels need to be extracted clearly and properly from a noisy background, drift image intensity, and low contrast pose. The Blood vessels of the human body can be visualized using ma...

Preserving Privacy Technique for Knowledge Discovery

Preserving Privacy Technique for Knowledge Discovery

A Study on Achromatic Coloring Graphs and its Applications

The achromatic number χa (G) of a graph is the greatest number of color in a vertex coloring such that each pair of colors appears on at least one edge. In this paper we give some properties of achromatic coloring for c...

Some Tribological Investigations on Zinc Base Alloy

ZA-27 alloys reinforced by Mn-containing intermetallic compounds were prepared and effect of Mn content on impact strength, hardness, tensile strength, volumetric wear rate and surface roughness were examined. By adding...

Supplementation of Lactic Acid and Citric Acid in Diets Replacing Antibiotic and its Influence on Broiler Performance, Meat Yield and Immune Response up to 42 Days of Age

The present study aimed at evaluating two organic acids, Lactic acid (LA) and Citric acid (CA), each of which at 1.0 and 2.0% levels for replacing antibiotic (AB-Virginiamycin 11mg/kg) from diets. In a feeding trial with...

Download PDF file
  • EP ID EP340610
  • DOI -
  • Views 63
  • Downloads 0

How To Cite

(2015). Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems. UNKNOWN, 4(1), -. https://europub.co.uk./articles/-A-340610