Downloads: 112 | Views: 300
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 7 / 10
Secure and Efficient Data Sharing for Decentralized DTN
Gauri N. Salodkar, Komal B. Bijwe
Abstract: Nowadays, there have been increasing demands and concerns for distributed data security, One of the most challenging issues in data sharing systems is the enforcement of access policies and the support of policies updates. Cipher text policy attribute-based encryption (CP-ABE) is becoming a promising cryptographic solution to this issue. It enables data owners to define their own access policies over user attributes and enforce the policies on the data to be distributed. Cipher text -policy attribute-based encryption (CP-ABE) is a guaranteeing cryptographic answer for the right to gain entrance control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. Thus a new methodology is introduced to provide successful communication between each other as well as access the confidential information provided by some major authorities like commander or other superiors. The methodology is called Disruption-Tolerant Network (DTN). This system provides efficient scenario for authorization policies and the policies update for secure data retrieval in most challenging cases. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network also we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently.
Keywords: Military Networks, Encryption, Decryption, DTN, CP-ABE
Edition: Volume 4 Issue 4, April 2015
Pages: 1912 - 1915
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 772 - 776Cryptographic Algorithm to Augment Data Security
Vipin R Bharadwaj, Nalina V, Rithvik Mohan V
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 11, November 2024
Pages: 404 - 406Comparative Analysis of Open-Source Encryption Tools: GnuPG vs. VeraCrypt
Ravi Kumar Singh, Vikalp, Dushyant Sharma, Aditya Pandey
Downloads: 12 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021
Pages: 788 - 791A New Cryptography Algorithm Based on ASCII Code
Yaser M.A. Abualkas