S Belguith
Secure publish and subscribe systems with efficient revocation
Belguith, S; Cui, S; Asghar, MR; Russello, G
Authors
S Cui
MR Asghar
G Russello
Abstract
User revocation is one of the main security issues in publish
and subscribe (pub/sub) systems. Indeed, to ensure data confidentiality, the system should be able to remove malicious
subscribers without affecting the functionalities and decoupling of authorised subscribers and publishers. To revoke
a user, there are solutions, but existing schemes inevitably
introduce high computation and communication overheads,
which can ultimately affect the system capabilities.
In this paper, we propose a novel revocation technique for
pub/sub systems that can efficiently remove compromised
subscribers without requiring regeneration and redistribution
of new keys as well as re-encryption of existing data with
those keys. Our proposed solution is such that a subscriber’s
interest is not revealed to curious brokers and published data
can only be accessed by the authorised subscribers. Finally,
the proposed protocol is secure against the collusion attacks
between brokers and revoked subscribers.
Citation
Belguith, S., Cui, S., Asghar, M., & Russello, G. (2018, April). Secure publish and subscribe systems with efficient revocation. Presented at ACM/SIGAPP Symposium On Applied Computing, Pau, France
Presentation Conference Type | Other |
---|---|
Conference Name | ACM/SIGAPP Symposium On Applied Computing |
Conference Location | Pau, France |
Start Date | Apr 9, 2018 |
End Date | Apr 13, 2018 |
Online Publication Date | Apr 13, 2018 |
Publication Date | Apr 13, 2018 |
Deposit Date | May 20, 2019 |
DOI | https://doi.org/10.1145/3167132.3167176 |
Publisher URL | https://doi.org/10.1145/3167132.3167176 |
Additional Information | Additional Information : Proceedings ISBN: 978-1-4503-5191-1 Event Type : Conference |
You might also like
On the security and privacy challenges of virtual assistants
(2021)
Journal Article
Security challenges of Internet of Underwater Things : a
systematic literature review
(2020)
Journal Article
Network traffic analysis for threats detection in the Internet of Things
(2020)
Journal Article
A survey of IoT security based on a layered architecture of sensing and data analysis
(2020)
Journal Article
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search