ABSTRACT
A publish-subscribe system is an information dissemination infrastructure that supports many-to-many communications among publishers and subscribers. In many publish-subscribe systems, in-network aggregation of input data is considered to be an important service that reduces the bandwidth requirements of the system significantly. In this paper, we present a scheme for securing the aggregation of inputs to such a publish-subscribe system. Our scheme, which focuses on the additive aggregate function, sum, preserves the confidentiality and integrity of aggregated data in the presence of untrusted routing nodes. Our scheme allows a group of publishers to publish aggregate data to authorized subscribers without revealing their individual private inputs to either the routing nodes or the subscribers. In addition, our scheme allows subscribers to verify that routing nodes perform the aggregation operation correctly. We use a message authentication code (MAC) scheme based on the discrete logarithm property to allow subscribers to verify the correctness of aggregated data without receiving the digitally-signed raw data used as input to the aggregation. In addition to describing our secure aggregation scheme, we provide formal proofs of its soundness and safety.
- Waseem Ahmad and Ashfaq Khokhar. Secure aggregation in large scale overlay networks. Proceedings of the 49th Global Telecommunications Conference, pages 1--5, November 2006.Google Scholar
- David E. Bakken, Carl H. Hauser, Harald Gjermundrod, and Anjan Bose. Towards more exible and robust data delivery for monitoring and control of the electric power grid. Technical Report TR-GS-009, Washington State University, May 2007.Google Scholar
- Antonio Carzaniga, David S. Rosenblum, and Alexander L. Wolf. Design and evaluation of a wide-area event notification service. ACM Transactions on Computer Systems, 19(3):332--383, August 2001. Google ScholarDigital Library
- Claude Castelluccia, Einar Mykletun, and Gene Tsudik. Efficient aggregation of encrypted data in wireless sensor networks. In The Second Annual Conference on Mobile and Ubiquitous Systems: Networking and Services, pages 109--117, July 2005. Google ScholarDigital Library
- Haowen Chan, Adrian Perrig, and Dawn Song. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of the 13th ACM conference on Computer and communications security, pages 278--287, New York, NY, USA, 2006. ACM. Google ScholarDigital Library
- Francis Chin. Security problems on inference control for sum, max, and min queries. J. ACM, 33(3):451--464, 1986. Google ScholarDigital Library
- Joao Girao, Markus Schneider, and Dirk Westhoff. On concealed data aggregation in wireless sensor networks. In Proceedings of IEEE International Conference on Communication, May 2005.Google Scholar
- Stuart Haber, William Horne, Tomas Sander, and Danfeng Yao. Privacy-preserving verification of aggregate queries on outsourced databases. Technical Report HPL-2006--128, HP Labs, December 2006.Google Scholar
- Wenbo He, Lue Liu, Hoang Nguyen, Klara Nahrstedt, and Tarek Abdelzaher. Pda: Privacy-preserving data aggregation in wireless sensor networks. 26th IEEE International Conference on Computer Communications, pages 2045--2053, May 2007.Google ScholarDigital Library
- Lingxuan Hu and David Evans. Secure aggregation for wireless networks. In Proceedings of the 2003 Symposium on Applications and the Internet Workshops, page 384, Washington, DC, USA, 2003. IEEE Computer Society. Google ScholarDigital Library
- Wolfgang Kastner, Georg Neugschwandtner, Stefan Soucek, and Michael H. Newmann. Communication systems for building automation and control. Proceedings of the IEEE, 93(6):1178--1203, June 2005.Google ScholarCross Ref
- Himanshu Khurana. Scalable security and accounting services for content-based publish/subscribe systems. In Proceedings of the 2005 ACM symposium on Applied computing, pages 801--807, New York, NY, USA, 2005. ACM Press. Google ScholarDigital Library
- Francesco M. Malvestuto and Mauro Mezzini. Auditing sum queries. In Proceedings of the 9th International Conference on Database Theory, pages 126--142, London, UK, 2002. Springer-Verlag. Google ScholarDigital Library
- Francesco M. Malvestuto, Mauro Mezzini, and Marina Moscarini. Auditing sum-queries to make a statistical database secure. ACM Transactions on Information System Security, 9(1):31--60, 2006. Google ScholarDigital Library
- Zoltan Miklos. Towards an access control mechanism for wide-area publish/subscribe systems. In Proceedings of the 22nd International Conference on Distributed Computing Systems, pages 516--524, Washington, DC, USA, 2002. IEEE Computer Society. Google ScholarDigital Library
- Lukasz Opyrchal and Atul Prakash. Secure distribution of events in content-based publish subscribe systems. In Proceedings of the 10th conference on USENIX Security Symposium, pages 21--21, Berkeley, CA, USA, 2001. USENIX Association. Google ScholarDigital Library
- Adrian Perrig, Ran Canetti, Doug Tygar, and Dawn Song. Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 56--73, Washington, DC, USA, May 2000. IEEE Computer Society. Google ScholarDigital Library
- Lauri I. W. Pesonen, David M. Eyers, and Jean Bacon. A capability-based access control architecture for multi-domain publish/subscribe systems. In Proceedings of the International Symposium on Applications on Internet, pages 222--228, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarDigital Library
- Lauri I. W. Pesonen, David M. Eyers, and Jean Bacon. Encryption-enforced access control in dynamic multi-domain publish/subscribe networks. In Proceedings of the 2007 inaugural international conference on Distributed event-based systems, pages 104--115, New York, NY, USA, 2007. ACM. Google ScholarDigital Library
- Costin Raiciu and David S. Rosenblum. Enabling confidentiality in content-based publish/subscribe infrastructures. Securecomm and Workshops, pages 1--11, 2006.Google ScholarCross Ref
- Venugopalan Ramasubramanian, Ryan Peterson, and Emin Gun Sirer. Corona: A high performance publish-subscribe system for the world wide web. In Proceedings of the 3rd Symposium on Networked Systems Design and Implementation, May 2006. Google ScholarDigital Library
- Jr. Robert O. Burnett, Marc M. Butts, and Patrick S. Sterlina. Power system applications for phasor measurement units. Computer Applications in Power, IEEE, 7(1):8--13, 1994.Google ScholarCross Ref
- Mudhakar Srivatsa and Ling Liu. Securing publish-subscribe overlay services with eventguard. In Proceedings of the 12th ACM conference on Computer and communications security, pages 289--298, New York, NY, USA, 2005. ACM Press. Google ScholarDigital Library
- Mudhakar Srivatsa and Ling Liu. Secure event dissemination in publish-subscribe networks. In Proceedings of the 27th International Conference on Distributed Computing Systems, page 22, Washington, DC, USA, 2007. IEEE Computer Society. Google ScholarDigital Library
- Robert Strom, Guruduth Banavar, Tushar Chandra, Marc Kaplan, Kevan Miller, Bodhi Mukherjee, Daniel Sturman, and Michael Ward. Gryphon: An information ow based approach to message brokering. In International Symposium on Software Reliability Engineering (ISSRE '98), November 1998.Google Scholar
- Kevin Tomsovic, David E. Bakken, Vaithianathan Venkatasubramanian, and Anjan Bose. Designing the next generation of real-time control, communication, and computations for large power systems. Proceedings OF THE IEEE, 93(5):965--979, 2005.Google ScholarCross Ref
- David Wagner. Resilient aggregation in sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 78--87, New York, NY, USA, 2004. ACM. Google ScholarDigital Library
- Chenxi Wang, Antonio Carzaniga, David Evans, and Alexander L. Wolf. Security issues and requirements for Internet-scale publish-subscribe systems. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Big Island, Hawaii, January 2002. Google ScholarDigital Library
- Yuanyuan Zhao and Daniel C. Sturman. Dynamic access control in a content-based publish/subscribe system with delivery guarantees. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, page 60, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarDigital Library
Index Terms
- Secure aggregation in a publish-subscribe system
Recommendations
Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms
Data publish-subscribe service is an effective approach to selectively share and selectively receive data. Towards the huge amount of data generated in our daily life, cloud systems, with economical but powerful storage and computing resources, are ...
Secure publish and subscribe systems with efficient revocation
SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied ComputingUser revocation is one of the main security issues in publish and subscribe (pub/sub) systems. Indeed, to ensure data confidentiality, the system should be able to remove malicious subscribers without affecting the functionalities and decoupling of ...
Language expressiveness and quality of service for publish/subscribe systems
MIDDLEWARE '12: Proceedings of the 9th Middleware Doctoral Symposium of the 13th ACM/IFIP/USENIX International Middleware ConferenceThe publish/subscribe paradigm is known for its loosely coupled interactions and event filtering capabilities. Traditional applications using pub/sub systems require large-scale deployment and high event throughput. Thus, pub/sub has always put the ...
Comments