A Novel Technique For Efficient Data Access In MDTN
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
It is pleasing to offer differentiated access services such thatdata access policies are distinct over user attributes or roles,which are direct by the key authorities. We propose a securedata recovery scheme using CP-ABE for decentralized DTNswhere manifold key authorities supervise their attributes by you.We make obvious how to be valid the proposed mechanism tofirmly and capablysupervise the not to be disclosed data scatteredin the disruption-tolerant military network. Mobile nodes in military environments such as abattlefield or a hostile region are expected to endure from discontinuous network connectivity and regular partitions. Disruption-tolerantnetwork (DTN) technologies are flattering successful solutionsthat allow wireless devices carried by soldiers to conversewith each other and right of entry the secret information or commandconsistently by exploiting external storage nodes. Some of themost demanding issues in this situation are the enforcement ofauthorization policies and the ruleinform for secure datarecovery.
Authors and Affiliations
G. Aruna Rekha, S. Indira Spandana
A survey on Transmission of data through illumination - Li-Fi
Li-Fi is a new wireless technology to provide the connectivity with in localized network environment. The main principle of this technology is we can transmit the data using light illumination by using light-emitting...
Performance Issues of WMNs by implementing Coordinator in IEEE 802.11 Networks
The wireless networking is the current trend that most of the peoples that used and fastly grow in the world. The number of topologies has been used in this network and few are Star, Bus , Mesh etc. but the Mesh Topol...
Android Based Braille Interactive System
In our daily life the telecommunication technology plays an important role. Despite of all these technological advancement in the telecommunication field, the physically impaired people have no access for these technolo...
Location Fixing by 3 DF Stations using Triangulation Method
One of the most important requirements placed on EW (Electronic Warfare) systems is the location of threat emitters. The paper deals with the location of an object at unknown position, on which bearings are taken fro...
Design and Implementation of GSM based Irrigation System Using ARM7
The developed system is a machine based system, which automates the irrigation of land by combining various software and hardware approaches together to find exact field information and to provide instant across the...