A Novel Technique For Efficient Data Access In MDTN
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
It is pleasing to offer differentiated access services such thatdata access policies are distinct over user attributes or roles,which are direct by the key authorities. We propose a securedata recovery scheme using CP-ABE for decentralized DTNswhere manifold key authorities supervise their attributes by you.We make obvious how to be valid the proposed mechanism tofirmly and capablysupervise the not to be disclosed data scatteredin the disruption-tolerant military network. Mobile nodes in military environments such as abattlefield or a hostile region are expected to endure from discontinuous network connectivity and regular partitions. Disruption-tolerantnetwork (DTN) technologies are flattering successful solutionsthat allow wireless devices carried by soldiers to conversewith each other and right of entry the secret information or commandconsistently by exploiting external storage nodes. Some of themost demanding issues in this situation are the enforcement ofauthorization policies and the ruleinform for secure datarecovery.
Authors and Affiliations
G. Aruna Rekha, S. Indira Spandana
A Secured Rank Based Multibiometrics System using Enhance Blind Encryption Technique
The unimodal biometric systems experiences significant limitations due to sensitivity to noise, intraclass variability, data quality, non-universality, and other factors. An attempt to improve the performance of indi...
COMPARISON AND STATISTICAL ANALYSIS OF NAM AND NORMAL SPEECH PROCESSING USING WAVELET TRANSFORM
In this, we present statistical approaches to enhance body-conducted unvoiced speech for silent speech communication using wavelet transform. So far Analysis of NAM speech has been made only using HMM (Hidden Markov...
Big Data Analytics in the Education Sector: Needs, Opportunities and Challenges
Academic institutions are now drawing attention in finding methods for making effective learning process, for identifying learner’s achievements and weakness, for tracing academic progress and also for predicting fut...
Effect of Moderators on Determinants: A Case Study of Technology Acceptance Models
From a few decades, studies has been conducted on various technology acceptance models to predict user acceptance of information technologies. These days various types of tools and information technologies are used i...
A Survey on Distributed Network Services Using SSO for Secure Mechanism
Methodologies presently use in single sign-on (SSO) for enable a legal user with a single credential to be authenticated by a multiple service providers in a distributed computer network. The earlier techniques cause...