SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Securing Brokerless Publish/SubscribeSystems 
Using Identity Based Encryption 
ABSTRACT 
The provisioning of basic security mechanisms such as authentication and 
confidentiality is highly challenging in a contentbasedpublish/subscribe system. 
Authentication of publishers and subscribers is difficult to achieve due to the 
loose coupling ofpublishers and subscribers. Likewise, confidentiality of events 
and subscriptions conflicts with content-based routing. This paperpresents a 
novel approach to provide confidentiality and authentication in a broker-less 
content-based publish/subscribe system. Theauthentication of publishers and 
subscribers as well as confidentiality of events is ensured, by adapting the 
pairing-based cryptographymechanisms, to the needs of a publish/subscribe 
system. Furthermore, an algorithm to cluster subscribers according to 
theirsubscriptions preserves a weak notion of subscription confidentiality. In 
addition to our previous work this paper contributes 1) useof searchable 
encryption to enable efficient routing of encrypted events, 2) multicredential 
routing a new event dissemination strategy to strengthen the weak subscription 
confidentiality, and 3) thorough analysis of different attacks on subscription 
confidentiality. Theoverall approach provides fine-grained key management and
the cost for encryption, decryption, and routing is in the order ofsubscribed 
attributes. Moreover, the evaluations show that providing security is affordable 
w.r.t. 1) throughput of the proposedcryptographic primitives, and 2) delays 
incurred during the construction of the publish/subscribe overlay and the event 
dissemination. 
EXISTING SYSTEM: 
In the past, most research has focused only on providingexpressive and scalable 
pub/sub systems, but little attentionhas been paid for the need of security. 
Existingapproaches toward secure pub/sub systems mostly relyon the presence 
of a traditional broker network. These either address security underrestricted 
expressiveness, for example, by using onlykeyword matching for routing events 
or rely ona network of (semi-)trusted brokers.Furthermore, existing approaches 
use coarse-grain epochbasedkey management and cannot provide fine-grainaccess 
control in a scalable manner. Nevertheless, security in broker-less 
pub/sub systems, where the subscribersare clustered according to their 
subscriptions, hasnot been discussed yet in the literature. 
PROPOSED SYSTEM: 
Proposed System presents a newapproach to provide authentication and 
confidentiality in abroker-less pub/sub system. Our approach allow subscribers 
to maintain credentials according to their subscriptions.Private keys assigned to 
the subscribers are labeledwith the credentials. A publisher associates each 
encryptedevent with a set of credentials. We adapted identity-basedencryption 
(IBE) mechanisms 1) to ensure that aparticular subscriber can decrypt an event 
only if there is amatch between the credentials associated with the eventand the 
key; and 2) to allow subscribers to verify theauthenticity of received events. 
Furthermore, we addressthe issue of subscription confidentiality in the presence 
ofsemantic clustering of subscribers. A weaker notion ofsubscription
confidentiality is defined and a secure overlaymaintenance protocol is designed 
to preserve the weaksubscription confidentiality. 
PROBLEM STATEMENT: 
It include two entities in thesystem: publishers and subscribers. Both the entities are 
computationally bounded and do not trust each other.Moreover, all the peers (publishers 
or subscribers) participatingin the pub/sub overlay network are honest and donot deviate 
from the designed protocol. Likewise, authorizedpublishers only disseminate valid events 
in the system.However, malicious publishers may masquerade theauthorized publishers 
and spam the overlay network withfake and duplicate events. We do not intend to solve 
thedigital copyright problem; therefore, authorized subscribersdo not reveal the content 
of successfully decrypted events toother subscribers. 
SCOPE: 
The pub/sub overlay proposed is similar to DPS system with modifications to 
ensure subscriptionconfidentiality. In this paper, we, therefore, 
evaluateperformance and scalability of the proposed pub/subsystem only with 
respect to the security mechanisms andomit other aspects. In particular, we 
evaluate the performance of our system the overlay construction timeand the 
event dissemination delays. We measure the average delay experienced byeach 
subscriber to connect to a suitable position in anattribute tree. Delay is measured 
from the time a subscribersends connection request message to a random peer in 
thetree till the time the connection is actually established. Theevaluations are 
performed only for a single attribute tree. It shows that the average connection 
time (delay)increases with the number of peers in the system because ofthe 
increase in the height of the attribute tree (each new hopincreases the network 
delay as well as time to applysecurity methods). 
MODULE DESCRIPTION:
Number of Modules 
After careful analysis the system has been identified to have the following 
modules: 
1. Content-Based Publish/Subcriber Module. 
2. Identity Based Encryption Module. 
3. Key Generation for Publisher/Subscriber Module. 
4. Secure Overlay MaintenanceModule. 
1.Content-Based Publish/SubscriberModule: 
The routing of events from publishers to the relevantsubscribers, we use the 
content-based data model. We consider pub/sub in a setting where there exists 
no dedicated broker infrastructure. Publishers and subscribers contribute as 
peers to the maintenance of a self-organizing overlay structure. To authenticate 
publishers, we use the concept of advertisements in which a publisher announces 
beforehand the set of events which it intends to publish. 
2.Identity Based Encryption Module: 
In our approach, publishers and subscribers interact with a key server. They 
provide credentials to the key server and in turn receive keys which fit the 
expressed capabilities in the credentials. Subsequently, those keys can be used to 
encrypt, decrypt, and sign relevant messages in the content based pub/sub 
system, i.e., the credential becomes authorized by the key server. The keys 
assigned to publishers and subscribers, and theciphertexts, are labeled with 
credentials. In particular, theidentity-based encryption ensures that a particular 
key candecrypt a particular ciphertext only if there is a matchbetween the
credentials of the ciphertext and the key.Publishers and subscribers maintain 
separate private keysfor each authorized credential. 
3.Key Generation For Publisher/SubscriberModule: 
Publisher keys: Before starting to publish events, a publishercontacts the key 
server along with the credentials for eachattribute in its advertisement. If the 
publisher is allowed topublish events according to its credentials, the key 
serverwill generate separate private keys for each credential. The public key of a 
publisher p for credentialis generated. 
Subscriber keys:Similarly, to receive events matching itssubscription, a 
subscriber should contact the key server andreceive the private keys for the 
credentials associated witheach attribute A. 
4.Secure Overlay MaintenanceModule: 
The secure overlay maintenance protocol is based on theidea that in the tree, 
subscribers are always connectedaccording to the containment relationship 
between theircredential. A new subscriber s generates a random key SW 
andencrypts it with the public keysfor all credentials thatcover its own 
credential, for example, a subscriber with credential will generate ciphertexts by 
applying thepublic keys. The generated cipher texts areadded to a connection 
request (CR) and the request isforwarded to a random peer in the tree. A 
connection isestablished if the peer can decrypt any of the cipher text using its 
private keys. 
SOFTWARE REQUIREMENTS: 
Operating System : Windows 
Technology : Java and J2EE
Web Technologies : Html, JavaScript, CSS 
IDE : My Eclipse 
Web Server : Tomcat 
Tool kit: Android Phone 
Database : My SQL 
Java Version : J2SDK1.5 
HARDWARE REQUIREMENTS: 
Hardware : Pentium 
Speed : 1.1 GHz 
RAM : 1GB 
Hard Disk : 20 GB 
Floppy Drive : 1.44 MB 
Key Board : Standard Windows Keyboard 
Mouse : Two or Three Button Mouse 
Monitor : SVGA

More Related Content

What's hot (16)

Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systems
IEEEFINALYEARPROJECTS
 
Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systems
IEEEFINALYEARPROJECTS
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architecture
Wen Zhu
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
Ubisecure
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
 
Ch01
Ch01Ch01
Ch01
n C
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution Attacks
Chema Alonso
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
IEEEFINALYEARPROJECTS
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
IJERA Editor
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
ijcsa
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
Alexander Decker
 
Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of Trust
Yousof Alsatom
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systems
IEEEFINALYEARPROJECTS
 
Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systems
IEEEFINALYEARPROJECTS
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architecture
Wen Zhu
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
Ubisecure
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
 
Ch01
Ch01Ch01
Ch01
n C
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution Attacks
Chema Alonso
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
IEEEFINALYEARPROJECTS
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
IJERA Editor
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
ijcsa
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
Alexander Decker
 
Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of Trust
Yousof Alsatom
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 

Similar to 2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subscribesystemsusing identity based encryption (20)

Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
IRJET - Protecting Investors Privacy in Online Trading System
IRJET - Protecting Investors Privacy in Online Trading SystemIRJET - Protecting Investors Privacy in Online Trading System
IRJET - Protecting Investors Privacy in Online Trading System
IRJET Journal
 
P01813101103
P01813101103P01813101103
P01813101103
IOSR Journals
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
Mphasis
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Editor IJMTER
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
IEEEFINALYEARPROJECTS
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Yashwanth Reddy
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsAccess Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network Relationships
IJMTST Journal
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
IJCERT JOURNAL
 
13 ijcse-01233
13 ijcse-0123313 ijcse-01233
13 ijcse-01233
Shivlal Mewada
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
H0362052056
H0362052056H0362052056
H0362052056
inventionjournals
 
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
JAYAPRAKASH JPINFOTECH
 
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
JAYAPRAKASH JPINFOTECH
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
IRJET Journal
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
jayaramb
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
IRJET - Protecting Investors Privacy in Online Trading System
IRJET - Protecting Investors Privacy in Online Trading SystemIRJET - Protecting Investors Privacy in Online Trading System
IRJET - Protecting Investors Privacy in Online Trading System
IRJET Journal
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
Mphasis
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Editor IJMTER
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
IEEEFINALYEARPROJECTS
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Yashwanth Reddy
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsAccess Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network Relationships
IJMTST Journal
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
IJCERT JOURNAL
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
JAYAPRAKASH JPINFOTECH
 
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe ...
JAYAPRAKASH JPINFOTECH
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
IRJET Journal
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
jayaramb
 

More from IEEEGLOBALSOFTSTUDENTSPROJECTS (20)

2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 

Recently uploaded (20)

JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
Reflections on Morality, Philosophy, and History
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Journal of Soft Computing in Civil Engineering
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 

2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subscribesystemsusing identity based encryption

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Securing Brokerless Publish/SubscribeSystems Using Identity Based Encryption ABSTRACT The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a contentbasedpublish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling ofpublishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based routing. This paperpresents a novel approach to provide confidentiality and authentication in a broker-less content-based publish/subscribe system. Theauthentication of publishers and subscribers as well as confidentiality of events is ensured, by adapting the pairing-based cryptographymechanisms, to the needs of a publish/subscribe system. Furthermore, an algorithm to cluster subscribers according to theirsubscriptions preserves a weak notion of subscription confidentiality. In addition to our previous work this paper contributes 1) useof searchable encryption to enable efficient routing of encrypted events, 2) multicredential routing a new event dissemination strategy to strengthen the weak subscription confidentiality, and 3) thorough analysis of different attacks on subscription confidentiality. Theoverall approach provides fine-grained key management and
  • 2. the cost for encryption, decryption, and routing is in the order ofsubscribed attributes. Moreover, the evaluations show that providing security is affordable w.r.t. 1) throughput of the proposedcryptographic primitives, and 2) delays incurred during the construction of the publish/subscribe overlay and the event dissemination. EXISTING SYSTEM: In the past, most research has focused only on providingexpressive and scalable pub/sub systems, but little attentionhas been paid for the need of security. Existingapproaches toward secure pub/sub systems mostly relyon the presence of a traditional broker network. These either address security underrestricted expressiveness, for example, by using onlykeyword matching for routing events or rely ona network of (semi-)trusted brokers.Furthermore, existing approaches use coarse-grain epochbasedkey management and cannot provide fine-grainaccess control in a scalable manner. Nevertheless, security in broker-less pub/sub systems, where the subscribersare clustered according to their subscriptions, hasnot been discussed yet in the literature. PROPOSED SYSTEM: Proposed System presents a newapproach to provide authentication and confidentiality in abroker-less pub/sub system. Our approach allow subscribers to maintain credentials according to their subscriptions.Private keys assigned to the subscribers are labeledwith the credentials. A publisher associates each encryptedevent with a set of credentials. We adapted identity-basedencryption (IBE) mechanisms 1) to ensure that aparticular subscriber can decrypt an event only if there is amatch between the credentials associated with the eventand the key; and 2) to allow subscribers to verify theauthenticity of received events. Furthermore, we addressthe issue of subscription confidentiality in the presence ofsemantic clustering of subscribers. A weaker notion ofsubscription
  • 3. confidentiality is defined and a secure overlaymaintenance protocol is designed to preserve the weaksubscription confidentiality. PROBLEM STATEMENT: It include two entities in thesystem: publishers and subscribers. Both the entities are computationally bounded and do not trust each other.Moreover, all the peers (publishers or subscribers) participatingin the pub/sub overlay network are honest and donot deviate from the designed protocol. Likewise, authorizedpublishers only disseminate valid events in the system.However, malicious publishers may masquerade theauthorized publishers and spam the overlay network withfake and duplicate events. We do not intend to solve thedigital copyright problem; therefore, authorized subscribersdo not reveal the content of successfully decrypted events toother subscribers. SCOPE: The pub/sub overlay proposed is similar to DPS system with modifications to ensure subscriptionconfidentiality. In this paper, we, therefore, evaluateperformance and scalability of the proposed pub/subsystem only with respect to the security mechanisms andomit other aspects. In particular, we evaluate the performance of our system the overlay construction timeand the event dissemination delays. We measure the average delay experienced byeach subscriber to connect to a suitable position in anattribute tree. Delay is measured from the time a subscribersends connection request message to a random peer in thetree till the time the connection is actually established. Theevaluations are performed only for a single attribute tree. It shows that the average connection time (delay)increases with the number of peers in the system because ofthe increase in the height of the attribute tree (each new hopincreases the network delay as well as time to applysecurity methods). MODULE DESCRIPTION:
  • 4. Number of Modules After careful analysis the system has been identified to have the following modules: 1. Content-Based Publish/Subcriber Module. 2. Identity Based Encryption Module. 3. Key Generation for Publisher/Subscriber Module. 4. Secure Overlay MaintenanceModule. 1.Content-Based Publish/SubscriberModule: The routing of events from publishers to the relevantsubscribers, we use the content-based data model. We consider pub/sub in a setting where there exists no dedicated broker infrastructure. Publishers and subscribers contribute as peers to the maintenance of a self-organizing overlay structure. To authenticate publishers, we use the concept of advertisements in which a publisher announces beforehand the set of events which it intends to publish. 2.Identity Based Encryption Module: In our approach, publishers and subscribers interact with a key server. They provide credentials to the key server and in turn receive keys which fit the expressed capabilities in the credentials. Subsequently, those keys can be used to encrypt, decrypt, and sign relevant messages in the content based pub/sub system, i.e., the credential becomes authorized by the key server. The keys assigned to publishers and subscribers, and theciphertexts, are labeled with credentials. In particular, theidentity-based encryption ensures that a particular key candecrypt a particular ciphertext only if there is a matchbetween the
  • 5. credentials of the ciphertext and the key.Publishers and subscribers maintain separate private keysfor each authorized credential. 3.Key Generation For Publisher/SubscriberModule: Publisher keys: Before starting to publish events, a publishercontacts the key server along with the credentials for eachattribute in its advertisement. If the publisher is allowed topublish events according to its credentials, the key serverwill generate separate private keys for each credential. The public key of a publisher p for credentialis generated. Subscriber keys:Similarly, to receive events matching itssubscription, a subscriber should contact the key server andreceive the private keys for the credentials associated witheach attribute A. 4.Secure Overlay MaintenanceModule: The secure overlay maintenance protocol is based on theidea that in the tree, subscribers are always connectedaccording to the containment relationship between theircredential. A new subscriber s generates a random key SW andencrypts it with the public keysfor all credentials thatcover its own credential, for example, a subscriber with credential will generate ciphertexts by applying thepublic keys. The generated cipher texts areadded to a connection request (CR) and the request isforwarded to a random peer in the tree. A connection isestablished if the peer can decrypt any of the cipher text using its private keys. SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE
  • 6. Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Tool kit: Android Phone Database : My SQL Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: Hardware : Pentium Speed : 1.1 GHz RAM : 1GB Hard Disk : 20 GB Floppy Drive : 1.44 MB Key Board : Standard Windows Keyboard Mouse : Two or Three Button Mouse Monitor : SVGA
  翻译: