Context-aware cryptographic policy for event-driven architectures: encryption based on event importance

Authors

DOI:

https://doi.org/10.46299/j.isjea.20260501.04

Keywords:

event-driven architecture, context-aware encryption, cryptographic policy, event classification, lightweight cryptography, encryption optimization, IoT security

Abstract

The article discusses an approach to building a context-oriented cryptographic policy for event-driven systems in which data exchange is implemented through asynchronous events, streams, and logs (log-based integration). Such systems generate huge volumes of heterogeneous events with varying criticality and confidentiality requirements. In such architectures, events are often delivered according to the at-least-once semantics, duplicated when repeated, stored for a long time in brokers/repositories, transferred between domains, and reproduced to restore the state. This increases the risks of compromising confidentiality and integrity, and also creates practical prerequisites for nonce/IV usage errors in authenticated encryption modes with attached data. The main idea of the work is to formalize the «importance of an event» as a policy attribute that guides the choice of a cryptographic profile (encryption algorithm, nonce strategy, associated data policy, key rotation, anti-replay mechanisms) taking into account limited resources (execution time, memory, energy consumption, overhead bytes, and network constraints). Existing approaches to event classification and selective encryption mechanisms are analyzed. A model of events and context, an importance function, a cost model, and a risk model are proposed, as well as an optimization problem of “minimizing costs under risk constraints” for automated selection of a protection profile. The scientific novelty lies in combining the principles of Authenticated Encryption with Associated Data and Attribute-Based Access Control approach to policies and hierarchical key management in a unified policy framework that takes into account the duplicates/retries/long-term storage of events characteristic of event-driven systems and introduces semantic integrity through authentication of the delivery context as part of associated data. The practical significance lies in the proposed policy templates for different levels of importance (L0–L3), as well as the methodology for domain isolation of keys and short cryptographic epochs, which reduce the consequences of compromise. An algorithm for dynamic determination of cryptographic parameters based on event priority has been developed. It is shown that adaptive encryption «by event importance» reduces cryptographic overhead in high-frequency streams without degrading the security of critical events, providing a manageable trade-off between risk and resources.

References

Confluent. (2024). What is Event Driven Architecture? https://www.confluent.io/learn/event-driven-architecture/

Pietrzak, S. (2024). Event-Driven Architectures: An Introduction and Security Challenges. Medium. https://medium.com/@spietrza/event-driven-architectures-an-introduction-and-security-challenges

Radhakrishnan, I., Jadon, S., & Honnavalli, P. B. (2024). Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices. Sensors, 24(12), 4008. https://doi.org/10.3390/s24124008

Liyanage, M. (2024). Event Driven Architecture for Large Scale IoT Systems. Medium; Xeynergy Blog. https://blog.xeynergy.com/event-driven-architecture-for-large-scale-iot-systems-511ea7d8b6cd

Zhong, Y., & Gu, J. (2024). Lightweight block ciphers for resource-constrained environments: A comprehensive survey. Future Generation Computer Systems, 157, 288-302. https://doi.org/10.1016/j.future.2024.03.054

Sylla, T., Chalouf, M.A., Krief, F., Samaké, K. (2020). Towards a Context-Aware Security and Privacy as a Service in the Internet of Things. https://doi.org/10.1007/978-3-030-41702-4_15

Turan M., McKay K., Kang J., Kelsey J., Chang D. (2025). Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions. https://doi.org/10.6028/NIST.SP.800-232

Lookabaugh, T., & Sicker, D. C. (2004). Selective encryption for consumer applications. IEEE Communications Magazine, 42(5), 124–129. https://doi.org/10.1109/mcom.2004.1299355

Inshi, S., Chowdhury, R., Ould-Slimane, H., & Talhi, C. (2023). Secure Adaptive Context-Aware ABE for Smart Environments. IoT, 4(2), 112-130. https://doi.org/10.3390/iot4020007

Shujaa W., Alanzi M., Sankaranarayanan S. (2025). Enhancing IoT security through blockchain integration. Frontiers in Computer Science. 7:1670473. https://doi.org/10.3389/fcomp.2025.1670473

Ansari, S.A., Ali, S. (2025). A systematic review of lightweight cryptographic schemes for security and privacy in IoT. Discov Computing 28, 266. https://doi.org/10.1007/s10791-025-09755-3

Dobraunig, C., Eichlseder, M., Mendel, F., & Schläffer, M. (2021). Ascon v1.2: Lightweight Authenticated Encryption and Hashing. Journal of Cryptology, 34(3). https://doi.org/10.1007/s00145-021-09398-9

Alzubaidi, A., & Kalita, J. (2016). Authentication of Smartphone Users Using Behavioral Biometrics. IEEE Communications Surveys & Tutorials, 18(3). https://doi.org/10.1109/comst.2016.2537748

Khan, S., Ferreira Lopes martins, P. A., Sousa, B., & Pereira, V. (2025). A Comprehensive Review on Lightweight Cryptographic Mechanisms for Industrial Internet of Things Systems. ACM Computing Surveys, 58(1), 1–37. https://doi.org/10.1145/3757734

Menon, R. (2024). The Impact Of Adaptive Encryption Algorithms On Cloud Data Confidentiality. In International Journal of Scientific Research & Engineering Trends. http://doi.org/10.5281/zenodo.17800103

Xu, Z., Zhou, W., Han, H. et al. (2025). A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding. Sci Rep 15, 11913. https://doi.org/10.1038/s41598-024-80307-3

Published

2026-02-01

How to Cite

Andrushchak, I., & Koloshko, O. (2026). Context-aware cryptographic policy for event-driven architectures: encryption based on event importance. International Science Journal of Engineering & Agriculture, 5(1), 38–47. https://doi.org/10.46299/j.isjea.20260501.04

Similar Articles

1 2 3 4 5 6 7 8 > >> 

You may also start an advanced similarity search for this article.