2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00238
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems

Abstract: Publish and subscribe (pub/sub) system is a decoupled communication paradigm that allows routing of publications. Through a set of dedicated third party servers, referred to as brokers, publications are disseminated without establishing any link between publishers and subscribers. However, the involvement of these brokers raises security and privacy issues as they can harvest sensitive data about subscribers. Furthermore, a malicious broker may collude with malicious subscribers and/or publishers to infer subs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

4
2

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…Third, thanks to the use of multiple brokers, the proposed solution is secure against collusion attacks between brokers and subscribers/publishers. Herein, we stress that the idea of using multiple types of brokers to defend against collusion attacks in pub/sub systems has been proposed in our previous work [1]. This work extends our idea by giving a detailed architecture, a comprehensive security analysis, and a thorough performance evaluation.…”
Section: Introductionmentioning
confidence: 82%
See 3 more Smart Citations
“…Third, thanks to the use of multiple brokers, the proposed solution is secure against collusion attacks between brokers and subscribers/publishers. Herein, we stress that the idea of using multiple types of brokers to defend against collusion attacks in pub/sub systems has been proposed in our previous work [1]. This work extends our idea by giving a detailed architecture, a comprehensive security analysis, and a thorough performance evaluation.…”
Section: Introductionmentioning
confidence: 82%
“…Then, the broker identifies the intended subscribers and forwards the publications to them. *This work is an extension of initial work appeared in the proceedings of the 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (Trustcom) 2018 under the title "Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems" by Shujie Cui, Sana Belguith, Pramodya De Alwis, Muhammad Rizwan Asghar, and Giovanni Russello [1].…”
Section: Introductionmentioning
confidence: 94%
See 2 more Smart Citations
“…That is, ensuring the secrecy of outsourced data is considered as a major challenge for cloud clients, due to the loss of data control [1], [2], [3]. Thus, several solutions have proposed to apply data encryption at the data owner side, such that the decrypting keys are preserved out of reach of the cloud provider [4], [5]. Although data encryption ensures the confidentiality of data against malicious entities, the use of traditional encryption mechanisms i.e., symmetric and asymmetric encryption is not sufficient to support fine-grained access control to outsourced data.…”
Section: Introductionmentioning
confidence: 99%