skip to main content
10.1145/3167132.3167176acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Secure publish and subscribe systems with efficient revocation

Published:09 April 2018Publication History

ABSTRACT

User revocation is one of the main security issues in publish and subscribe (pub/sub) systems. Indeed, to ensure data confidentiality, the system should be able to remove malicious subscribers without affecting the functionalities and decoupling of authorised subscribers and publishers. To revoke a user, there are solutions, but existing schemes inevitably introduce high computation and communication overheads, which can ultimately affect the system capabilities.

In this paper, we propose a novel revocation technique for pub/sub systems that can efficiently remove compromised subscribers without requiring regeneration and redistribution of new keys as well as re-encryption of existing data with those keys. Our proposed solution is such that a subscriber's interest is not revealed to curious brokers and published data can only be accessed by the authorised subscribers. Finally, the proposed protocol is secure against the collusion attacks between brokers and revoked subscribers.

References

  1. Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, and Giovanni Russello. 2014. PIDGIN: Privacy-preserving interest and content sharing in opportunistic networks. In Proceedings of the 9th ACM symposium on information, computer and communications security. ACM, 135--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Raphaël Barazzutti, Pascal Felber, Hugues Mercier, Emanuel Onica, and Etienne Riviere. 2017. Efficient and confidentiality-preserving content-based publish/subscribe with prefiltering. IEEE Transactions on Dependable and Secure Computing 14, 3 (2017), 308--325. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, and Rabah Attia. 2016. PAbAC: A Privacy preserving Attribute based framework for fine grained Access Control in clouds. In SECRYPT 2016: 13th International Conference on Security and Cryptography, Vol. 4. Scitepress, 133--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. John Bethencourt, Amit Sahai, and Brent Waters. 2007. Ciphertext-policy attribute-based encryption. In Security and Privacy, 2007. SP'07. IEEE Symposium on. IEEE, 321--334. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dan Boneh and Matt Franklin. 2001. Identity-based encryption from the Weil pairing. In Advances in Cryptology - CRYPTO 2001. Springer, 213--229. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dan Boneh and Brent Waters. 2007. Conjunctive, subset, and range queries on encrypted data. Theory of cryptography (2007), 535--554. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cristian Borcea, Yuriy Polyakov, Kurt Rohloff, Gerard Ryan, et al. 2017. PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption. Future Generation Computer Systems 71 (2017), 177--191.Google ScholarGoogle ScholarCross RefCross Ref
  8. Zvika Brakerski and Vinod Vaikuntanathan. 2011. Fully homomorphic encryption from ring-LWE and security for key dependent messages. In Annual cryptology conference. Springer, 505--524. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Tracy Yingying Cheng, Wei Gao, Xiaohua Jia, Jianfei He, and Shucheng Liu. 2016. Privacy-preserving publish/subscribe service in untrusted third-party platform. In Communications (ICC), 2016 IEEE International Conference on. IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  10. Giovanni Di Crescenzo, Jim Burns, Brian Coan, John Schultz, Jonathan Stanton, Simon Tsang, and Rebecca N Wright. 2013. Efficient and private three-party publish/subscribe. In International Conference on Network and System Security. Springer, 278--292.Google ScholarGoogle ScholarCross RefCross Ref
  11. Abebe Abeshu Diro, Naveen Chilamkurti, and Neeraj Kumar. 2017. Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing. Mobile Networks and Applications (2017), 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Christian Esposito and Mario Ciampi. 2015. On Security in Publish/Subscribe Services: A Survey. IEEE Communications Surveys and Tutorials 17, 2 (2015), 966--997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Mihaela Ion, Giovanni Russello, and Bruno Crispo. 2010. Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. In SecureComm. Springer, 272--289.Google ScholarGoogle Scholar
  14. Mihaela Ion, Giovanni Russello, and Bruno Crispo. 2012. Design and implementation of a confidentiality and access control solution for publish/subscribe systems. Computer networks 56, 7 (2012), 2014--2037. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Vincenzo Iovino and Giuseppe Persiano. 2008. Hidden-vector encryption with groups of prime order. In International Conference on Pairing-Based Cryptography. Springer, 75--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Tao Jiang, Xiaofeng Chen, and Jianfeng Ma. 2016. Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65, 8 (2016), 2363--2373.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mohamed Nabeel, Stefan Appel, Elisa Bertino, and Alejandro Buchmann. 2013. Privacy preserving context aware publish subscribe systems. In International Conference on Network and System Security. Springer, 465--478.Google ScholarGoogle ScholarCross RefCross Ref
  18. Mohamed Nabeel, Ning Shang, and Elisa Bertino. 2012. Efficient privacy preserving content based publish subscribe systems. In Proceedings of the 17th ACM symposium on Access Control Models and Technologies. ACM, 133--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Emanuel Onica, Pascal Felber, Hugues Mercier, and Etienne Rivière. 2015. Efficient key updates through subscription re-encryption for privacy-preserving publish/subscribe. In Proceedings of the 16th Annual Middleware Conference. ACM, 25--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Emanuel Onica, Pascal Felber, Hugues Mercier, and Etienne Rivière. 2016. Confidentiality-preserving publish/subscribe: A survey. ACM Computing Surveys (CSUR) 49, 2 (2016), 27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Pascal Paillier et al. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Eurocrypt, Vol. 99. Springer, 223--238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Partha Pal, Greg Lauer, Joud Khoury, Nick Hoff, and Joe Loyall. 2012. P3S: A privacy preserving publish-subscribe middleware. In ACM/IFIP/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing. Springer, 476--495. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, and Vinod Vaikuntanthan. 2017. Fast Proxy Re-Encryption for Publish/Subscribe Systems. IACR Cryptology ePrint Archive 2017 (2017), 410.Google ScholarGoogle Scholar
  24. Muhammad Adnan Tariq, Boris Koldehofe, and Kurt Rothermel. 2014. Securing broker-less publish/subscribe systems using identity-based encryption. IEEE transactions on parallel and distributed systems 25, 2 (2014), 518--528. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Yuan Tian, Biao Song, Mohammad Mehedi Hassan, and Eui-nam Huh. 2013. An efficient privacy preserving Pub-Sub system for ubiquitous computing. International Journal of Ad Hoc and Ubiquitous Computing 12, 1 (2013), 23--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Kan Yang, Kuan Zhang, Xiaohua Jia, M Anwar Hasan, and Xuemin Sherman Shen. 2017. Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. Information Sciences 387 (2017), 116--131. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing
    April 2018
    2327 pages
    ISBN:9781450351911
    DOI:10.1145/3167132

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 9 April 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate1,650of6,669submissions,25%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader