available solutions and propose a solution which can
achieve all based on CP-ABE, KP-ABE and multi-
user SDE. Our goal is to support both publication and
subscription confidentiality while not requiring pub-
lishers and subscribers to share secret keys. Although
events and filters are encrypted, brokers should per-
form event filtering without learning any information.
Finally, subscribers should be able to express filters
that can define any monotonic and non-monotonic
constraints on events.
As future work we are planing to provide a con-
crete design of our solution. We will also provide
a formal security analysis of our scheme. We will
implement the schema and integrate it with a main-
stream pub/sub system in order to evaluate the intro-
duced overhead.
ACKNOWLEDGEMENTS
The work of the third author is partially funded by the
EU project MASTER contract no. FP7-216917.
REFERENCES
Bacon, J., Moody, K., Bates, J., Hayton, R., Ma, C., Mc-
Neil, A., Seidel, O., and Spiteri, M. (2000). Generic
support for distributed applications. IEEE Computer,
33(3):68–76.
Banavar, G., Chandra, T., Mukherjee, B., Nagarajarao, J.,
Strom, R., and Sturman, D. (1999). An efficient multi-
cast protocol for content-based publish-subscribe sys-
tems. In International Conference on Distributed
Computing Systems, volume 19, pages 262–272. IEEE
COMPUTER SOCIETY PRESS.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In IEEE
Symposium on Security and Privacy, pages 321–334.
Citeseer.
Carzaniga, A., Rosenblum, D., and Wolf, A. (2001). De-
sign and evaluation of a wide-area event notification
service. ACM Transactions on Computer Systems
(TOCS), 19(3):332–383.
Dong, C., Russello, G., and Dulay, N. (2008). Shared
and Searchable Encrypted Data for Untrusted Servers.
Lecture Notes in Computer Science, 5094:127–143.
Eugster, P., Felber, P., Guerraoui, R., and Kermarrec, A.
(2003). The many faces of publish/subscribe. ACM
Computing Surveys (CSUR), 35(2):131.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In Proceedings of the 13th
ACM conference on Computer and communications
security, page 98. ACM.
Hapner, M., B. R. S. R. F. J. and Stout, K. (2002). Java
message service. Sun Microsystems Inc., Santa Clara,
CA.
Khurana, H. (2005). Scalable security and accounting ser-
vices for content-based publish/subscribe systems. In
Proceedings of the 2005 ACM symposium on Applied
computing, page 807. ACM.
Ostrovsky, R., Sahai, A., and Waters, B. (2007). Attribute-
based encryption with non-monotonic access struc-
tures. In Proceedings of the 14th ACM conference
on Computer and communications security, page 203.
ACM.
Raiciu, C. and Rosenblum, D. (2006). Enabling confiden-
tiality in content-based publish/subscribe infrastruc-
tures. Securecomm and Workshops, 28:1–11.
Shikfa, A., Onen, M., and Molva, R. (2009). Privacy-
Preserving Content-Based Publish/Subscribe Net-
works. In Emerging Challenges for Security, Privacy
and Trust: 24th Ifip Tc 11 International Information
Security Conference, SEC 2009, Pafos, Cyprus, May
18-20, 2009, Proceedings, page 270. Springer.
Singhera, Z. (2008). A workload model for topic-based
publish/subscribe systems.
Srivatsa, M. and Liu, L. (2007). Secure event dissemina-
tion in publish-subscribe networks. In Proceedings
of the 27th International Conference on Distributed
Computing Systems, page 22. Citeseer.
Wang, C., Carzaniga, A., Evans, D., and Wolf, A. (2002).
Security issues and requirements for Internet-scale
publish-subscribe systems. In PROCEEDINGS OF
THE ANNUAL HAWAII INTERNATIONAL CONFER-
ENCE ON SYSTEM SCIENCES, pages 303–303.
Zhuang, S., Zhao, B., Joseph, A., Katz, R., and Kubia-
towicz, J. (2001). Bayeux: An architecture for scal-
able and fault-tolerant wide-area data dissemination.
In Proceedings of the 11th international workshop on
Network and operating systems support for digital au-
dio and video, page 20. ACM.
SECRYPT 2010 - International Conference on Security and Cryptography
292