Skip to main content
Top

2021 | OriginalPaper | Chapter

Enhanced Blockchain Application for Pub-Sub Model

Authors : Nomaun Rathore, Shri Kant

Published in: Advances in Electromechanical Technologies

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The asynchronous communication is required for the distributed systems, these are fulfilled using the middleware products and services. The publisher-subscriber method is one of them. It is used for sending messages and on the other hand, they are the receivers. Due to the involvement of the third party (broker), there were security flaws. Blockchain technology was introduced providing confidentiality, integrity authentication, etc. that too in a broker-less environment. In this paper a new system is being introduced having the cryptographic functions like DES and RNS are used for encryption of data and creating the public and private keys for end-to-end encryption for the new system with blockchain, i.e. the authority control based system. The improved hashing technique SHA2-512, is used. An identity-based encryption mechanism is also introduced in making this system more secure against the known attacks that previous systems failed to provide.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference He X, Sha L (1999) A fault tolerant real-time publisher/subscriber inter-process communication architecture. In: Proceedings 6th international conference on the real-time computing systems and its applications. Rtcsa’99 (Cat. No. Pr00306), 13–15 Dec. IEEE He X, Sha L (1999) A fault tolerant real-time publisher/subscriber inter-process communication architecture. In: Proceedings 6th international conference on the real-time computing systems and its applications. Rtcsa’99 (Cat. No. Pr00306), 13–15 Dec. IEEE
2.
go back to reference Maithily B, Swathi Y (2015) Securing broker-less publish/subscribe system using fuzzy identity-based encryption. Int J Comput Sci Inform Technol 6(3):2823–2826 Maithily B, Swathi Y (2015) Securing broker-less publish/subscribe system using fuzzy identity-based encryption. Int J Comput Sci Inform Technol 6(3):2823–2826
3.
go back to reference Malpure VD, Deshmukh PK (2016) Provide security for broker-less content based publish system using pairing based cryptography. Int J Eng Dev Res (IJEDR) 4:1932–1938 Malpure VD, Deshmukh PK (2016) Provide security for broker-less content based publish system using pairing based cryptography. Int J Eng Dev Res (IJEDR) 4:1932–1938
5.
go back to reference Yu Y, Yang B, Sun Y et al (2009) Identity based signcryption scheme without random oracles. Comput Stand Interfaces 31(1):56–62CrossRef Yu Y, Yang B, Sun Y et al (2009) Identity based signcryption scheme without random oracles. Comput Stand Interfaces 31(1):56–62CrossRef
6.
go back to reference Tariq MA, Koldehofe B, Altaweel A et al (2010) Providing basic security mechanisms in broker-less publish/subscribe systems. In: Proceedings of the fourth ACM international conference on distributed event-based systems. ACM, pp 38–49 Tariq MA, Koldehofe B, Altaweel A et al (2010) Providing basic security mechanisms in broker-less publish/subscribe systems. In: Proceedings of the fourth ACM international conference on distributed event-based systems. ACM, pp 38–49
7.
go back to reference Shitole S, Gujar AD (2016) Securing broker-less publisher/subscriber systems using cryptographic technique. In: International conference on computing communication control and automation (ICCUBEA), pp 1–6. IEEE Shitole S, Gujar AD (2016) Securing broker-less publisher/subscriber systems using cryptographic technique. In: International conference on computing communication control and automation (ICCUBEA), pp 1–6. IEEE
8.
go back to reference Yang K, Zhang K, Jia X et al (2017) Privacy-preserving attributekeyword based data publish-subscribe service on cloud platforms. Inf Sci 387:116–131CrossRef Yang K, Zhang K, Jia X et al (2017) Privacy-preserving attributekeyword based data publish-subscribe service on cloud platforms. Inf Sci 387:116–131CrossRef
9.
go back to reference Yuen TH, Susilo W, Mu Y (2014) Towards a cryptographic treatment of publish/subscribe systems. J Comput Secur 22(1):33–67CrossRef Yuen TH, Susilo W, Mu Y (2014) Towards a cryptographic treatment of publish/subscribe systems. J Comput Secur 22(1):33–67CrossRef
11.
go back to reference Chiesa A, Green M, Liu J et al (2017) Decentralized anonymous micropayments. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 609–642 Chiesa A, Green M, Liu J et al (2017) Decentralized anonymous micropayments. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 609–642
12.
go back to reference Wang C, Carzaniga A, Evans D et al (2002) Security issues and requirements for internet-scale publish-subscribe systems. Syst Sci 3940–3947 Wang C, Carzaniga A, Evans D et al (2002) Security issues and requirements for internet-scale publish-subscribe systems. Syst Sci 3940–3947
13.
go back to reference Xu D, Xiao L, Sun L, Lei M (2017) Game theoretic study on blockchain based secure edge networks. In: IEEE/Cic international conference on communications in China (ICCC) Xu D, Xiao L, Sun L, Lei M (2017) Game theoretic study on blockchain based secure edge networks. In: IEEE/Cic international conference on communications in China (ICCC)
14.
go back to reference Navin AH, Khashandarag AS, Oskuei AR, Mirnia M (2011) A novel approach cryptography by using residue number system. In: 2011 6th International conference on computer sciences and convergence information technology (ICCIT), 29 Nov–1 Dec Navin AH, Khashandarag AS, Oskuei AR, Mirnia M (2011) A novel approach cryptography by using residue number system. In: 2011 6th International conference on computer sciences and convergence information technology (ICCIT), 29 Nov–1 Dec
Metadata
Title
Enhanced Blockchain Application for Pub-Sub Model
Authors
Nomaun Rathore
Shri Kant
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5463-6_27

Premium Partners