CP-ABE Secure Data Retrieval
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 9
Abstract
Partitions in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity. Disruption-tolerant network DTN technologies are true and easy solutions. DTN is a Disruption-tolerant network. Thus a new methodology is introduced to provide successful communication between each other as well as access the confidential information provided by some major authorities like commander or other superiors. This system provides efficient scenario for authorization policies and the policies update for secure data retrieval in most challenging cases. The most promising cryptographic solution is introduced to control the access issues called Cipher text Policy Attribute Based Encryption (CP-ABE). The Attribute-based encryption scheme fulfills the requirements for secure data retrieval in DTNs. The concept is Cipher text Policy ABE), it gives an appropriate way of encryption of data. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. The encryption includes the attribute set that the decryption needs to possess in order to decrypt the cipher text. Hence, many users can be allowed to decrypt different parts of data according to the security policy.
Authors and Affiliations
Salini K, Sruthy Manmadhan
Assessment of the Impact of Fireworks on Ambient Air Quality
Fireworks are one of the most unusual sources of pollution in atmosphere; although transient, these pollution episodes are responsible for high concentrations of pollutants. The festival of Diwali is celebrated all over...
Big Data Analytics on Unemployment & Health Records
Now a day’s huge amount of data is produced from the social web sites, government industries, public sectors etc., Storing and Maintaining the data is big challenge which is solved by special databases and programming l...
slugDESIGNING OF REGIONAL TRUSTED AUTHORITY WITH LOCATION BASED SERVICE DISCOVERY PROTOCOL IN VANET
VANET is a form of Mobile Ad - Hoc Network or MANET and its different from MANET due to high mobility of nodes and the large scale of networks. The proposed location based service discovery pro...
Implementation of Modified Booth Algorithm for Parallel MAC
This paper presents the methods required to implement a high speed and high performance parallel complex number multiplier. The designs are structured using Radix-4 Modified Booth Algorithm and Wallace tree. These two...
Distributed Verifiable Data Control in Cloud Storage
Data integrity, Data Confidentiality is the main vital role in cloud storage. It allows the users to verify the outsourced data is kept intact without downloading the whole data. In Most of the area the clients have to...