[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A security framework for Content-Based Publish-Subscribe system

Published: 01 July 2006 Publication History

Abstract

Content-Based Publish-Subscribe system is an important emerging model in e-commerce applications. The distribution of contents to the Subscribers in a scalable and secured way is a very important requirement of these applications. Security schemes exercising centralized control cannot be applied directly to these applications due to the increased number of Subscribers subscribing to a particular event. This is because of the enormous growth of Internet. The centralized approach increases the burden on the central controller, which is the major entity in security management. To solve this problem, an efficient grouping is done based on the decentralized mechanism and a novel key management scheme is proposed for secured distribution of contents. The proposed method minimizes the overheads. The model is simulated and the results are found to be optimum compared to other methods.

References

[1]
S. Annadurai, G. Padmavathi, Scalable security framework for multicasting over IP for e-commerce applications, in: Proceedings of International Conference on Responsive Supply Chain and Organizational Competitiveness - RSC:2004, vol. I, no. 9, January 2004.
[2]
Balenson, D., McGrew, D. and Sherman, A., Key management for large dynamic groups: one-way function trees and amortized initialization. Areas Communication, Special Issue on Middleware. v17. 1614-1631.
[3]
C, Ballardie, Scalable multicast key distribution, RFC 1949, May 1996.
[4]
S. Banerjee, B. Battarcharjee, Scalable secure group communication for IP Multicast, Technical Report, CS-TR 4252, Department of Computer Science, University of Maryland, College Park, 2001.
[5]
Boyd, C., On key agreement and conference key agreement. In: ACISP: Australian Conference on Information Security and Privacy, Springer, Berlin. pp. 294-302.
[6]
Burmester, M.V.D. and Desmedt, Y., A secure and efficient conference key distribution system. In: Lecture Notes in Computer Science, vol. 950. Springer, Berlin. pp. 275-286.
[7]
A.D. Celik, A scalable approach for subscription based information commerce, in: Proceedings of the 2nd International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems, Milpitas, CA, June, 2000.
[8]
Chiou, G. and Chen, W., Secure broadcasting using secure lock. IEEE Transactions on Software Engineering. v15 i8.
[9]
Wong, C.K., Gouda, M. and Simon, L.S., Secure group communication using key graphs. IEEE/ACM Transactions on Networking. v8 i1. 16-30.
[10]
C.K. Wong, M. Gouda, L.S. Simon, Keystone: a group key management system, in: Proceedings of International Conference on Telecommunications, May, 2000.
[11]
L.R. Dondeti, S. Mukerjee, A. Samal, A dual encryption protocol for scalable secure multicasting, in: Proceedings of the Fourth International Symposium on Computers and Communications, Egypt, March, 1999.
[12]
S. Deering, Host extensions for IP multicasting, Internet Draft, RFC1112, 1989.
[13]
Eriksson, H., MBONE: the multicast backbone. Communications of the ACM. v37 i8. 54-60.
[14]
T. Hardjono, B. Cain, N. Doraswamy, A framework for group key management for multicast security, IETF Internet draft, 1999.
[15]
H. Harney, C. Muckenhirn, Group key management protocol (gkmp) architecture, RFC 2094, July, 1997.
[16]
Indrakshi Ray, Indrrajit Ray, Using compatible keys for secure multicasting in e-commerce, in: Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS'02), 2002.
[17]
Ingemarsson, I., Tang, D.T. and Wong, C.K., A conference key distribution system. IEEE Transactions on Information Theory. v28 i5. 714-720.
[18]
Moyer, M.J., Rao, J.R. and Rohatgi, P., A survey of security issues in multicast communications. IEEE Network. iNovember/December. 12-23.
[19]
D.A. McGrew, A.T. Sherman, Key establishment in large dynamic groups using one-way function trees, Technical Report No. 0755, TIS Labs at Network Associates, Inc., Glenwood, MD, 1998.
[20]
M. Steiner, G. Tsudik, M. Waidner, Cliques: a new approach to group key agreement, in: Proceedings of IEEE International Conference on Distributed Computer Systems, May, 1998.
[21]
Wittmann, R. and Zitterbart, M., Multicast Communication Protocols and Applications. 2001. Morgan Kaufmann, Los Altos, CA.
[22]
S. Rafaeli, A decentralized architecture for group key management, IETF Internet Drafts, September, 2000.
[23]
Rafaeli, S. and Hutchison, D., A survey of key management for secure group communication. ACM Computing Surveys. v35 i3. 309-329.
[24]
S.E. Deering, Multicast routing in internetworks and extended to LAN, in: Proceedings of ACM SIGCOMM'88, August, 1988.
[25]
Stenier, M., Tsudik, G. and Waidner, M., Diffie-Hellman key distribution extended to group communication. In: SIGSAC Proceedings of the 3rd ACM Conference on Computer and Communications Security, ACM, New York. pp. 31-37.
[26]
M.S. Iolus, A framework for scalable secure multicasting, in: Proceedings of ACM SIGCOMM, 1997, pp. 277-288.
[27]
Trappe, W., Song, J., Poovendran, R. and Ray Liu, K.J., Key management and distribution for secure multimedia multicast. IEEE Transactions on Multimedia. v5 i4. 544-557.
[28]
D.M. Wallner, E.J. Harder, R.C. Agee, Key management for multicast: issues and architectures, Internet Draft, RFC 2627, June, 1999.
[29]
Internet Research Task Force (IRTF), The Secure Multicast Research Group (SMuG). Available from: <http://www.ipmulticast.com/community/smug/>.

Cited By

View all
  • (2017)Anti Unreal Trading of Intelligent E-commerce Platform Framework Design For B2CProceedings of the 4th Multidisciplinary International Social Networks Conference10.1145/3092090.3092094(1-6)Online publication date: 17-Jul-2017
  • (2015)On Security in Publish/Subscribe Services: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2014.236461617:2(966-997)Online publication date: 1-Apr-2015
  • (2015)A cost-effective key distribution of P2P IPTV DRM over opportunistic multicast overlay for e-commerce systemsElectronic Commerce Research10.1007/s10660-015-9176-515:1(49-71)Online publication date: 1-Mar-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Electronic Commerce Research and Applications
Electronic Commerce Research and Applications  Volume 5, Issue 1
Summer 2006
93 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 July 2006

Author Tags

  1. Content-Based Publish-Subscribe system
  2. Decentralized approach
  3. Hierarchical sub-groups and key management
  4. Security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Anti Unreal Trading of Intelligent E-commerce Platform Framework Design For B2CProceedings of the 4th Multidisciplinary International Social Networks Conference10.1145/3092090.3092094(1-6)Online publication date: 17-Jul-2017
  • (2015)On Security in Publish/Subscribe Services: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2014.236461617:2(966-997)Online publication date: 1-Apr-2015
  • (2015)A cost-effective key distribution of P2P IPTV DRM over opportunistic multicast overlay for e-commerce systemsElectronic Commerce Research10.1007/s10660-015-9176-515:1(49-71)Online publication date: 1-Mar-2015
  • (2011)Service and P2P based secure media sharing in mobile commerce environmentsElectronic Commerce Research10.1007/s10660-010-9069-611:1(91-101)Online publication date: 1-Jan-2011

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media