A New Primitive Framework For Secure Publish/Subscribe System Using Signature Key Based Encryption

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-25 Number-2
Year of Publication : 2015
Authors : Sagar.C, S.Md.Shafiullah


Sagar.C, S.Md.Shafiullah "A New Primitive Framework For Secure Publish/Subscribe System Using Signature Key Based Encryption". International Journal of Computer Trends and Technology (IJCTT) V25(2):77-81, July 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
The fundamental security of substance based Publisher/Subscriber framework gives verification and classifiedness in Publish/Subscribe. Because of free coupling, it’s troublesome to accomplish the verification of distributer and endorser. As like, classifiedness of occasions and memberships clashes with substance based steering. Here we are going to give verification and classifiedness in agent-less Publisher/Subscriber frameworks, by utilizing the paring based cryptographic component, the confirmation and classifiedness of distributer and supporter of occasions is guaranteed. This paper gives the signcryption which is an intense primitive that offers both privacy and realness to essentialmessages. Signcryption performs all the advanced encryption modes like bit conversion, key generation and key distributions.Ant Colony Behavior Inspired Particle Swarm Improvement Technique has been adjusted for Resource Allocation what's more, accomplish Energy Efficiency.

[1] E. Anceaume, M. Gradinariu, A.K. Datta, G. Simon, and A.Virgillito, “A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe,” Proc. 26th IEEE Int’l Conf. Distributed ComputingSystems (ICDCS),2006.
[2] J. Bacon, D.M. Eyers, J. Singh, and P.R. Pietzuch, “Access Controlin Publish/Subscribe Systems,” Proc. Second ACM Int’l Conf.Distributed Event-Based Systems (DEBS),2008.
[3] W.C. Barker and E.B. Barker, “SP 800-67 Rev. 1. Recommendationfor the Triple Data Encryption Algorithm (TDEA) Block Cipher,”technical report, Nat’l Inst. of Standards & Technology, 2012.
[4] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext- PolicyAttribute-Based Encryption,”Proc. IEEE Symp. Security andPrivacy,2007.
[5] D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, “PublicKey Encryption with Keyword Search,”Proc. Int’l Conf. Theory andApplications of Cryptographic Techniques on Advances in Cryptology(EUROCRYPT),2004.
[6] D. Boneh and M.K. Franklin, “Identity-Based Encryption from theWeil Pairing,”Proc. Int’l Cryptology Conf. Advances in Cryptology,2001.
[7] S. Choi, G. Ghinita, and E. Bertino, “A Privacy- EnhancingContent-Based Publish/Subscribe System Using Scalar ProductPreserving Transformations,”Proc. 21st Int’l Conf. Database andExpert Systems Applications: Part I,2010.
[8] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- BasedEncryption for Fine-Grained Access Control of Encrypted Data,”Proc. ACM 13th Conf. Computer and Comm. Security (CCS),2006.
[9] M. Ion, G. Russello, and B. Crispo, “Supporting Publication andSubscription Confidentiality in Pub/Sub Networks,”Proc. SixthInt’l ICST Conf. Security and Privacy in Comm. Networks (Secur-eComm),2010.
[10] H.-A. Jacobsen, A.K.Y. Cheung, G. Li, B. Maniymaran, V.Muthusamy, and R.S. Kazemzadeh, “The PADRES Publish/Subscribe System,” Principles and Applications of DistributedEvent-Based Systems.IGI Global, 2010.
[11] M. Jelasity, A. Montresor, G.P. Jesi, and S. Voulgaris, “PeerSim: APeer-to-Peer Simulator,” http://peersim.sourceforge.net/, 2013.
[12] H. Khurana, “Scalable Security and Accounting Services forContent-Based Publish/Subscribe Systems,”Proc. ACM Symp.Applied Computing,2005.

Publisher, Subscriber, Content Based Encryption, Signcryption.