1 research outputs found

    Comparitive Study on Secure Data Retrieval Framework for Military Networks

    Get PDF
    In the immensely colossal number of outgrowing commercial environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the conventional medium. Portable nodes in military environments, for example, a front line or an antagonistic area are prone to experience the undergo of eccentric system network and frequent partitions. Disruption-tolerant network (DTN) innovations are getting to be fruitful results that sanction remote contrivance conveyed by officers to verbalize with one another and access the confidential data or secret data or summon dependably by abusing outside capacity nodes or storage nodes. Thus an incipient methodology is introduced to provide prosperous communication between each other as well as access the confidential information provided by some major ascendant entities like commander or other superiors. The methodology is called Disruption-Tolerant Network (DTN). This system provides efficient scenario for sanction policies and the policies update for secure data retrieval in most challenging cases. The most promising cryptographic solution is introduced to control the access issues called Cipher text Policy Attribute Predicated Encryption (CP-ABE). Some of the most challenging issues in this scenario are the enforcement of sanction policies and the policies update for secure data retrieval. Ciphertext -policy attribute-predicated encryption (CP-ABE) is a assuring cryptographic answer for the right to gain ingress control issues. However, the quandary of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different ascendant entities. In this paper, we propose a secure data retrieval scheme utilizing CP-ABE for decentralized DTNs where multiple key ascendant entities manage their attributes independently..We demonstrate how to apply the proposed mechanism to safely and proficiently deal with the relegated information dispersed in the Interruption or disruption tolerant network DOI: 10.17762/ijritcc2321-8169.16046
    corecore