Advertisement

Distributed and Anonymous Publish-Subscribe

  • Jörg Daubert
  • Mathias Fischer
  • Stefan Schiffner
  • Max Mühlhäuser
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)

Abstract

Publish-subscribe is a scheme for distributing information based on interests. While security mechanisms have been added to publish-subscribe, privacy, in particular anonymous communication is hardly considered. We summarize security and privacy requirements for such systems, including an adversary model for privacy. We introduce a construction for publish-subscribe overlays that fulfills the requirements. Contrary to previous approaches, it does neither presume an online trusted third party, nor expensive cryptographic operations performed by brokers. Further, we informally discuss how our requirements are met.

Keywords

privacy pub-sub overlay 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Barazzutti, R., Felber, P., et al.: Thrifty Privacy: Efficient Support for Privacy-Preserving Publish / Subscribe. In: DEBS, pp. 225–236. ACM (2012)Google Scholar
  2. 2.
    Chen, W., Jiangt, J., Skocik, N.: On the privacy protection in publish/subscribe systems. In: WCNIS, pp. 597–601. IEEE (2010)Google Scholar
  3. 3.
    Choi, S., Ghinita, G., Bertino, E.: A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations. In: Bringas, P.G., Hameurlain, A., Quirchmayr, G. (eds.) DEXA 2010, Part I. LNCS, vol. 6261, pp. 368–384. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  4. 4.
    Fenner, B., et al.: Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised). RFC 4601 (Proposed Standard) (2006)Google Scholar
  5. 5.
    Eugster, P.T., Felber, P., Guerraoui, R., Kermarrec, A.: The many faces of publish/subscribe. ACM Computing Surveys (CSUR) 35(2), 114–131 (2003)CrossRefGoogle Scholar
  6. 6.
    Ganesh, A.J., Kermarrec, A., Massoulié, L.: Peer-to-Peer Membership Management for Gossip-Based Protocols. IEEE (TC) 52(2), 139–149 (2003)Google Scholar
  7. 7.
    Ion, M., Russello, G., Crispo, B.: Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICS, vol. 50, pp. 272–289. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  8. 8.
    Nabeel, M., Shang, N., Elisa, B.: Efficient privacy preserving content based publish subscribe systems. In: SACMAT, pp. 133–144. ACM (2012)Google Scholar
  9. 9.
    Pfitzmann, A., Köhntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Raiciu, C., Rosenblum, D.S.: Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures. In: SecureComm, pp. 1–11. IEEE (August 2006)Google Scholar
  11. 11.
    Schiffner, S., Clauß, S.: Using linkability information to attack mix-based anonymity services. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 94–107. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  12. 12.
    Shikfa, A., Önen, M., Molva, R.: Privacy in context-based and epidemic forwarding. In: WoWMoM, pp. 1–7. IEEE (June 2009)Google Scholar
  13. 13.
    Shikfa, A., Önen, M., Molva, R.: Privacy-Preserving Content-Based Publish/Subscribe Networks. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol. 297, pp. 270–282. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  14. 14.
    Srivatsa, M., Liu, L.: Securing publish-subscribe overlay services with EventGuard. In: CCS, p. 289. ACM (2005)Google Scholar
  15. 15.
    Tariq, M.A., Koldehofe, B., Altaweel, A., Rothermel, K.: Providing basic security mechanisms in broker-less publish / subscribe systems. In: DEBS, pp. 38–49. ACM (July 2010)Google Scholar
  16. 16.
    Wang, C., Carzaniga, A., Evans, D., Wolf, A.L.: Security Issues and Requirements for Internet-Scale Publish-Subscribe Systems. In: HICSS, pp. 3940–3947. IEEE (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Jörg Daubert
    • 1
  • Mathias Fischer
    • 1
  • Stefan Schiffner
    • 1
  • Max Mühlhäuser
    • 1
  1. 1.CASED, Telecooperation GroupTechnische Universität DarmstadtDarmstadtGermany

Personalised recommendations