Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing nvironment has been recognized as an imperative equirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted nformation-sharing approach for government departments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of onfidential and top secret information amongst security ersonnels and government departments within the national oundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and overnment intelligence departments to avoid threatening activities. The experimental results demonstrate the ffectiveness of the proposed information sharing approach.
Authors and Affiliations
Md. Headayetullah , G. K. Pradhan
Implementation of a Secured system with Roaming Server and Roaming Ports
The main goal of this paper is to design and implement a secured system against Server hijacking, which leads to Denial of Service (DoS) [5] attacks. This system uses more than one server for providing security. But only...
Face Recognition Technique Using PCA, Wavelet and SVM
We present a method of face recognition in which features are extracted by applying Principal component analysis on wavelet subband. Support vector machine and nearest distance methods are used for classification. Result...
A Novel Document Clustering Algorithm Using Squared Distance Optimization Through Genetic Algorithms
K-Means Algorithm is most widely used algorithms in document clustering. However, it still suffer some shortcomings like random initialization, solution converges to local minima, and empty cluster formation. Genetic alg...
Global Chaos Synchronization of Hyperchaotic Lorenz and Hyperchaotic Chen Systems by Adaptive Control
In this paper, we apply adaptive control method to derive new results for the global chaos synchronization of identical hyperchaotic Lorenz systems (2007), identical hyperchaotic Chen systems (2010) and non-identical hyp...
Knowledge-driven Intuitionistic Fuzzy Decision Support for finding out the causes of Obesity
In this paper, we propose an Intuitionistic Fuzzy decision support system for determining the causes of a more or less common disorder – obesity. Obesity can be simply lifestyle related i.e. excessive food energy intake...