1,085 research outputs found

    Attribute Based Secure Data Retrieval System for Decentralized Disruption Tolerant Military Networks

    Get PDF
    There are partitions in military environments such as a battlefield or a hostile region.They are likely to suffer from intermittent network connectivity.They having frequent partitions. Disruption-tolerant network DTN technologies are is a true and easy solutions.DTN is a Disruption-tolerant network.It allow devices which are wireless and carried by peoples in a military to interact with each other.These devices access the confidential information or command reliably by exploiting external storage nodes. In these networking environments DTN is very successful technology. When there is no wired connection between a source and a destination device, the information from the source node may need to wait in the intermediate nodes for a large amount of time until the connection would be correctly established.one of the challenching approach is a ABE.that is attribute-based encryption which fulfills the requirements for secure data retrieval in DTNs. The another concept is Cipher text Policy ABE (CP-ABE).it gives a appropriate way of encryption of data. the encryption includes the attribute set that the decryption needs to possess in order to decrypt the cipher text.hence, Many users can be allowed to decrypt different parts of data according to the security policy

    Attribute Based Secure Military Data Retrieval System for Decentralized Disruption Tolerant Networks

    Get PDF
    In this section, we provide a multi authority CP-ABE scheme for secure data retrieval in decentralized DTNs. Each local authority issues partial personalized and attribute key components to a user by performing secure 2PC protocol with the central authority. Each attribute key of a user can be updated individually and immediately. Thus, the scalability and security can be enhanced in the proposed scheme. Since the first CP-ABE scheme proposed by Bettencourt et al , dozens of CP-ABE schemes have been proposed. The subsequent CP-ABE schemes are mostly motivated by more rigorous security proof in the standard model. However, most of the schemes failed to achieve the expressiveness of the Bettencourt et al.’s scheme, which described an efficient system that was expressive in that it allowed an encrypt or to express an access predicate in terms of any monotonic formula over attributes. Therefore, in this section, we develop a variation of the CP-ABE algorithm partially based on (but not limited to) Bettencourt et al.’s construction in order to enhance the expressiveness of the access control policy instead of building a new CP-ABE scheme from scratc

    CP-ABE IN DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS FOR SECURE RETRIEVAL OF DATA

    Get PDF
    In this rapidly growing world, communication involves transfer of confidential information across the globe within a short amount of time. This kind of technical communication involves network of communicating devices. These devices will be carrying the confidential data across the devices which may be far apart. In military environment, communication disruption can occur because of intermittent network connectivity. Solution found for these kinds of disruption is the Disruption Tolerant Network (DTN) technology. This technology allows the soldiers to reliably access the data by using the capacity of the external storage nodes. Most challenging issue found in this DTN technology is enforcement of authorization policies and update of policies for the retrieval of confidential data.  CP-ABE is one such cryptographic method which provides the solution to the access control issues. But there exists several problems with regard to key escrow, attribute revocation and coordination of attributes which are issued by different key authorities when applying CP-ABE in decentralized DTNs. In this paper, more secured method for the retrieval of confidential data using CP-ABE for decentralized DTNs is proposed where sets of attributes will be generated and managed by multiple authorities independently and addresses several existing proble

    A Survey on Security in Data Sharing Application for Decentralized Military Network

    Get PDF
    Portable hubs in military situations, for example, a front line or a threatening locale are liable to experience the ill effects of irregular system network and continuous allotments. Interruption tolerant system (DTN) advances are getting to be fruitful arrangements that permit remote gadgets conveyed by officers to correspond with one another and access the classified data or summon dependably by misusing outer stockpiling hubs. The absolute most difficult issues in this situation are the implementation of approval strategies and the approaches redesign for secure information recovery. Ciphertext-approach trait based encryption (CP-ABE) is a promising cryptographic answer for the entrance control issues. Be that as it may, the issue of applying CP-ABE in decentralized DTNs presents a few security and protection challenges as to the property denial, key escrow, and coordination of characteristics issued from distinctive powers. In this paper, we propose a safe information recovery plan utilizing CP-ABE for decentralized DTNs where various key powers deal with their qualities freely. We show how to apply the proposed instrument to safely and effectively deal with the private information dispersed in the disturbance tolerant military system

    An Approach for Security in Data Sharing Application for Decentralized Military Network

    Get PDF
    Portable hubs in military situations, for example, a front line or a threatening locale are liable to experience the ill effects of irregular system network and continuous allotments. Interruption tolerant system (DTN) advances are getting to be fruitful arrangements that permit remote gadgets conveyed by officers to correspond with one another and access the classified data or summon dependably by misusing outer stockpiling hubs. The absolute most difficult issues in this situation are the implementation of approval strategies and the approaches redesign for secure information recovery. Cipher text-approach trait based encryption (CP-ABE) is a promising cryptographic answer for the entrance control issues. Be that as it may, the issue of applying CP-ABE in decentralized DTNs presents a few security and protection challenges as to the property denial, key escrow, and coordination of characteristics issued from distinctive powers. In this paper, we propose a safe information recovery plan utilizing CP-ABE for decentralized DTNs where various key powers deal with their qualities freely. We show how to apply the proposed instrument to safely and effectively deal with the private information dispersed in the disturbance tolerant military system

    A Cluster Tree Based Model for Secure Data Retrieval in Military using Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSNs) can be used in military environments such as a battlefield tracking the enemies. One of the challenging issues in this scenario is enforcement of authorization policies and the policies update for secure data retrieval. CP-ABE is using efficient and secure data retrieval method for decentralized DTNs. However implementing Cipher text-Policy Attribute – Based Encryption (CP-ABE) in decentralized DTNs where the key authorities might be compromised or not fully trusted. In this paper we propose a secured data retrieval method using Cluster Tree Based Model proposes grouping the slave nodes, where each node has an individual group head. The cluster model provide key to group head and the group head will distribute the key to all members and implementing Position-based Aggregator Node Election protocol (PANEL) is a position-based clustering routing protocol for WSNs. The main goal of PANEL is to elect aggregators, i.e., CHs. PANEL protocol are used to balance the network node load pressure and reduces the communication load

    Comparitive Study on Secure Data Retrieval Framework for Military Networks

    Get PDF
    In the immensely colossal number of outgrowing commercial environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the conventional medium. Portable nodes in military environments, for example, a front line or an antagonistic area are prone to experience the undergo of eccentric system network and frequent partitions. Disruption-tolerant network (DTN) innovations are getting to be fruitful results that sanction remote contrivance conveyed by officers to verbalize with one another and access the confidential data or secret data or summon dependably by abusing outside capacity nodes or storage nodes. Thus an incipient methodology is introduced to provide prosperous communication between each other as well as access the confidential information provided by some major ascendant entities like commander or other superiors. The methodology is called Disruption-Tolerant Network (DTN). This system provides efficient scenario for sanction policies and the policies update for secure data retrieval in most challenging cases. The most promising cryptographic solution is introduced to control the access issues called Cipher text Policy Attribute Predicated Encryption (CP-ABE). Some of the most challenging issues in this scenario are the enforcement of sanction policies and the policies update for secure data retrieval. Ciphertext -policy attribute-predicated encryption (CP-ABE) is a assuring cryptographic answer for the right to gain ingress control issues. However, the quandary of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different ascendant entities. In this paper, we propose a secure data retrieval scheme utilizing CP-ABE for decentralized DTNs where multiple key ascendant entities manage their attributes independently..We demonstrate how to apply the proposed mechanism to safely and proficiently deal with the relegated information dispersed in the Interruption or disruption tolerant network DOI: 10.17762/ijritcc2321-8169.16046

    Survey on Encryption Techniques in Delay and Disruption Tolerant Network

    Full text link
    Delay and disruption tolerant network (DTN) is used for long area communication in computer network, where there is no direct connection between the sender and receiver and there was no internet facility. Delay tolerant network generally perform store and forward techniques as a result intermediate node can view the message, the possible solution is using encryption techniques to protect the message. Starting stages of DTN RSA, DES, 3DES encryption algorithms are used but now a day\u27s attribute based encryption (ABE) techniques are used. Attribute based encryption technique can be classified in to two, key policy attribute based encryption (KPABE) and cipher policy attribute based encryption (CPABE). In this paper we perform a categorized survey on different encryption techniques presents in delay tolerant networks. This categorized survey is very helpful for researchers to propose modified encryption techniques. Finally the paper compares the performance and effectiveness of different encryption algorithms

    SECURELY DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION TOLERANT MILITARY SYSTEMS

    Get PDF
    There are some parts of the military environment, such as battlefields or hostile areas. They may suffer from intermittent network connections. They have frequent partitions. Networking DTN networking technology is a truly simple solution. DTN network, tear-resistant; it allows wireless and military personnel to carry the interaction with each other. These devices reliably protect confidential information or use external storage node commands. In these network environments, DTN is a very successful technology. If there is no wired connection between the source and the target device, the intermediate node may need information from the source node for a long time until the connection is properly established. One of the complex methods is ABE. This is a property-based encryption that meets the requirements for secure data retrieval in DTN. This concept is a password strategy Cipher text-Policy ABE (CP-ABE). It provides an appropriate way to encrypt data. Encryption includes a set of attributes that need to be decrypted to decrypt the encrypted text. Therefore, many users can be allowed to decrypt different data according to the security polic
    • …
    corecore