PRIVACY PRESERVING IN ACCESS POLICY CONSOLIDATION FOR LARGE-SCALE EVENT PROCESSING SYSTEMS

V.S.B.E. Prasad Tamarapalli, Rajesh Ghanta

Abstract


Event processing is an approach that can capture and process the data about the events. Complex event processing is the merging the information from multiple origins. Event processing systems has a procedure that continuous event streams will be further applied operation of event streams. In distributed-applications like a large warehouse (where items can be shipped) when we are processing the events. This will be transmitting in between many security authorities. Using the access-policy every incoming event can be secured. We can increase the processing of events by calculating the measure of obfuscation values for events. Calculate the threshold for obfuscation as one of the part of access-policy and avoid the access-requirements and events will be delivered more reliable. In this way we can deliver the more events.


Keywords


Event; Access-Policy; Security; Obfuscation;

References


A. Buchmann and B. Koldehofe, “Complex event processing,” it - Information Technology, vol. 51:5, pp. 241–242, 2009.

A. Hinze, K. Sachs, and A. Buchmann, “Event-based applications and enabling technologies,” in Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, ser. DEBS ’09. New York, NY, USA: ACM, 2009, pp. 1:1–1:15.

P. Pietzuch, “Hermes: A scalable event-based middleware,” Ph.D. dissertation, University of Cambridge, 2004.

G. Li and H.-A. Jacobsen, “Composite subscriptions in content-based publish/subscribe systems,” in Proc of the 6 th Int. Middleware Conf., 2005, pp. 249–269.

G. G. Koch, B. Koldehofe, and K. Rothermel, “Cordies: expressive event correlation in distributed systems,” in Proc. of the 4th ACM International Conference on Distributed Event-Based Systems (DEBS), 2010, pp. 26–37.

B. Koldehofe, B. Ottenw¨alder, K. Rothermel, and U. Ramachandran, “Moving range queries in distributed complex event processing,” in Proc. of the 6th ACM International Conference on Distributed Event-Based Systems (DEBS), 2012, pp. 201–212.

B. Schilling, B. Koldehofe, U. Pletat, and K. Rothermel, “Distributed heterogeneous event processing: Enhancing scalability and interoperability of CEP in an industrial context,” in Proc. of the 4th ACM International Conference on Distributed Event-Based Systems (DEBS), 2010, pp. 150–159.

B. Schilling, B. Koldehofe, and K. Rothermel, “Efficient and distributed rule placement in heavy constraint-driven event systems,” in Proc. of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC), 2011, pp. 355–364.

M. A. Tariq, B. Koldehofe, A. Altaweel, and K. Rothermel, “Providing basic security mechanisms in broker-less publish/ subscribe systems,” in Proceedings of the 4th ACM Int. Conf. on Distributed Event-Based Systems (DEBS), 2010, pp. 38–49.

M. A. Tariq, B. Koldehofe, A. Altaweel, and K. Rothermel, “Providing basic security mechanisms in broker-less publish/ subscribe systems,” in Proceedings of the 4th ACM Int. Conf. on Distributed Event-Based Systems (DEBS), 2010, pp. 38–49.

J. Bacon, D. M. Eyers, J. Singh, and P. R. Pietzuch, “Access control in publish/subscribe systems,” in Proc. of the 2nd ACM International Conference on Distributed Event-Based Systems (DEBS), 2008, pp. 23–34.

M. A. Tariq, B. Koldehofe, G. G. Koch, I. Khan, and K. Rothermel, “Meeting subscriber-defined QoS constraints in publish/subscribe systems,” Concurrency and Computation: Practice and Experience, vol. 23, no.17, pp. 2140–2153, 2011.

S. Rizou, F. D¨urr, and K. Rothermel, “Providing qos guarantees in large-scale operator networks,” in High Performance Computing and Communications (HPCC), 2010 12th IEEE International Conference on, 2010, pp.337 –345.

S. J. Russell and P. Norvig, Artificial Intelligence: A Modern Approach, 2nd ed. Prentice Hall, 2002.

S. Geman and D. Geman, “Stochastic relaxation, gibbs distributions, and the bayesian restoration of images,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. PAMI-6, pp. 721 –741, 1984.

A. E. Gelfand and A. F. M. Smith, “Sampling-based approaches to calculating marginal densities,” Journal of the American Statistical Association, vol. 85, no. 410, pp.398–409, 1990.

Schilling, Björn, et al. "Access Policy Consolidation for Event Processing Systems." Networked Systems (NetSys), 2013 Conference on. IEEE, 2013.


Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.