1,542
29
Essay, 2 pages (300 words)

Security of brokerless (cloud) architectures

Security of Brokerless Architectures By Security systems Security system that are used include content-based publish; secure goals and requirements, identity-based encryptions, numeric attributes and key generation for subscribers. Security systems that have been used such as secure event dissemination have ensured that publishing of event as are managed (Duncan, 2009). Cipher texts that are used in this system need to reflect back to the roots of attribute tree. Security is enhanced in the system since cipher texts are labelled each with a unique symbol.
Strengths of approach
Security system that have been used have made authentication possible (Duncan, 2009). Authentication has been used in the security system to avoid publication that is non-legible with only those that are authorised being able to publish events in the system. Confidentiality has been maintained in the system since events are only visible to subscribers and are protected from modification that is illegal. Confidentiality also makes subscriptions done by subscribers to be confidential and not able to be forged (John, 2010).
Weakness of approach
Scalability has made scaling with the number of people that are subscribers in the system. Key server has enabled maintenance of constant number of keys per transaction.
Weak notions have occurred reducing confidentiality since peers need to know subscriptions that are made by their parents. Parents also need to know subscriptions that are made by their children (John, 2010). Overlay maintenance should also be done in the right way such that credentials of subscribers are not confused making one to get to publications of others (Pesonen, Eyers and Bacon, (2007).
References
W. Pesonen, Eyers, and J. Bacon, (2007) “ Encryption-EnforcedAccess Control in Dynamic Multi-Domain Publish/SubscribeNetworks,” Proc. ACM Int’l Conf. Distributed Event-Based Systems (DEBS)
Press Duncan, T. (2009). Publishing security. Kidhaven
John R. (2010). Management of sites and publishing security. Oxford press

Thank's for Your Vote!
Security of brokerless (cloud) architectures. Page 1
Security of brokerless (cloud) architectures. Page 2
Security of brokerless (cloud) architectures. Page 3

This work, titled "Security of brokerless (cloud) architectures" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Security of brokerless (cloud) architectures'. 15 September.

Reference

AssignBuster. (2022, September 15). Security of brokerless (cloud) architectures. Retrieved from https://assignbuster.com/security-of-brokerless-cloud-architectures/

References

AssignBuster. 2022. "Security of brokerless (cloud) architectures." September 15, 2022. https://assignbuster.com/security-of-brokerless-cloud-architectures/.

1. AssignBuster. "Security of brokerless (cloud) architectures." September 15, 2022. https://assignbuster.com/security-of-brokerless-cloud-architectures/.


Bibliography


AssignBuster. "Security of brokerless (cloud) architectures." September 15, 2022. https://assignbuster.com/security-of-brokerless-cloud-architectures/.

Work Cited

"Security of brokerless (cloud) architectures." AssignBuster, 15 Sept. 2022, assignbuster.com/security-of-brokerless-cloud-architectures/.

Get in Touch

Please, let us know if you have any ideas on improving Security of brokerless (cloud) architectures, or our service. We will be happy to hear what you think: [email protected]