Publish/subscribe (pub/sub) system is an emerging
communication paradigm that offers efficient and decoupled
information dissemination in distributed environments.
Decoupling increases the privacy of each participant. Publishers
generate the flow of information as publications and subscribers
interests may be expressed as subscriptions. Basic security
mechanisms such as authentication and confidentiality is highly
challenging in a content based publish/subscribe system. These
work focused on a review and comparison of different security
methods that are existing.
Published In : IJCAT Journal Volume 2, Issue 2
Date of Publication : March 2015
Pages : 90 - 93
Figures :--
Tables : 01
Publication Link :Survey on Security Methods in Publish/Subscribe
System
Prathyusha M. Kumar : M-Tech Student, Computer Science and Engineering
M. E. S. College of Engineering, Kuttippuram, India
Arun Anoop M. : Assistant Professor, Computer Science and Engineering
M. E. S. College of Engineering, Kuttippuram, India
Viju P. Poonthottam : Assistant Professor, Information Technology
M. E. S. College of Engineering, Kuttippuram, India
Content Based
Publish/Subscribe
Brokerless,
Security
Publish/subscribe is a distributed interaction paradigm
well adapted to the deployment of scalable and loosely
coupled systems. Here various techniques for supporting
confidential publish/subscribe is discussed. There is more
scope for future researches in the field of secure data
sharing in publish/subscribe systems.
[1] L. Opyrchal and A. Prakash, “Secure distribution of
events in contentbased publishsubscribe systems,”
Proceedings of the 10th USENIX Security
Symposium, August 2001
[2] L. Fiege, A. Zeidler, A. Buchmann, R. K.-Kehr, and
G. M¨uhl, “Security aspects in publish/subscribe
systems,” Proceedings of the Third International
Workshop on Distributed Event-Based Systems, 2004.
[3] M. Srivatsa and L. Liu., "Securing publisher
subscriber overlay services with event guard," ACM
conf. on Computer and communications security, 2005
[4] Khurana H., "security and accounting services for
content-based publish/subscribe systems," ACM
symposium on Applied computing , Santa Fe,USA.,
2005
[5] Raiciu C. and Rosenblum D. S., "Enabling
Confidentiality in Content-Based Publish/Subscribe
Infrastructures," IEEE Second CreatNet Intl Conf.
Security and Privacy in Comm. Networks
(SecureComm), 2006
[6] M. Srivatsa and L. Liu, “Secure event dissemination
in publishsubscribe networks,” Proceedings of the
27th International Conference on Distributed
Computing Systems, 2007.
[7] Shikfa, A., Anen M., and Molva, R. ,” Privacypreserving
content-based publish/Subscribe
networks,”Computer Networks,2008
[8] J. Bacon, D.M. Eyers, J. Singh, and P.R. Pietzuch,
“Access Control in Publish/Subscribe Systems,”
ACM Int’l Conf.Distributed Event-Based Systems
(DEBS), 2008
[9] Choi S., Ghinita G., and Bertino E., "A privacyenhancing
content-based publish/subscribe system
using scalar product preserving transformations,
“Springer Berlin / Heidelberg, 2010
[10] M.A. Tariq, B. Koldehofe, A. Altaweel, and K.
Rothermel , "Providing Basic Security Mechanisms in
Broker-Less Publish/ Subscribe Systems," ACM
Fourth Intl Conf. Distributed Event- Based Systems
(DEBS), 2010
[11] T.-H. Yuen, W. Susilo, and Y. Mu, “Towards a
cryptographic treatment of publish/subscribe systems,”
Cryptology and Network Security, vol. 6467, pp. 201–
220, 2010.
[12] M. Ion, G. Russello, and B. Crispo, “Design and
implementation of a confidentiality and access control
solution for publish/subscribe systems,” Computer
Networks, vol. 56, no. 7, pp. 2014–2037, 2012
[13] Pal, P., Lauer, G., Khoury, J., Ho_, N., and Loyall, J.
,”P3s: a privacy preserving publish-subscribe
Middleware,”Springer-Verlag New York, Inc,2012
[14] M. Nabeel, N. Shang, and E. Bertino, “Efficient
privacy preserving content based publish subscribe
systems,” Proceedings of the 17th ACM symposium
on Access Control Models and Technologies, pp. 133–
144, June 2012
[15] M.A. Tariq, B. Koldehofe, and K. Rothermel ,
"Securing Broker-Less Publish/Subscribe Systems
Using Identity-Based Encryption," IEEE Transactions
on Parallel and Distributed
systems,vol.25,no.2,February, 2014
[16] J. Bethencourt ,A.Sahai and B.Waters, "Ciphertextpolicy
attribute based encryption," IEEE Symbosium
on security and privacy,pp.321-334, 2007
[17] M.Nabeel ,N.Shang and E.Bertino, "Efficient privacy
preserving content based publish subscribe systems,"
ACM symposium on access control Models and
Technologies, 2012