Downloads: 117 | Views: 283
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015 | Popularity: 6.3 / 10
Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks
Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.
Abstract: To undergo from continual partitions and infrequent network connectivity, the military environments mobile nodes are likely. The wireless devices carried by soldiers Disruption-tolerant network (DTN) technologies and to allow that wireless drivers, which are now find successful solutions for communication to each other and access the confidential information or command dependently by applying external storage nodes. for retrieval of data securely and the update the policies, in this scenario Some of the most challenging issues are the authorization policies enforcement. A Cipher text-policy which is attribute-based encryption (CP-ABE) is the bright solution for the accessing the control issue. However, there introduced the many privacy and security challenges by the problem of applying CP-ABE Approach in decentralized DTNs with attention to the revocation of attribute, escrow of key, and attributes coordination taken from different authorities. In this paper, using CP-ABE we are going to propose a scheme which retrieves the data securely for decentralized DTNs where their attributes are independently managed by the multiple key authorities. In the disruption-tolerant military network for managing the confidential distributed data securely and efficiently, we determine how to apply the mechanism of proposed system.
Keywords: Access control, Attribute-based Encryption ABE, Multi-authority, Disruption-Tolerant Network DTN, Secure Data Retrieval
Edition: Volume 4 Issue 9, September 2015
Pages: 1590 - 1593
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 12, December 2024
Pages: 448 - 453Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies
Dr. A. Lavanya
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 306 - 309A Basic Framework for Policy Updates for the Outsourced Exchange of Private Medical Records
V. Jayaganesh
Downloads: 9 | Weekly Hits: ⮙3 | Monthly Hits: ⮙6
Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024
Pages: 844 - 850Data-Driven Decision Making: Advanced Database Systems for Business Intelligence
Maria Anurag Reddy Basani, Anudeep Kandi
Downloads: 68
Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021
Pages: 61 - 70Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution
Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga