Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing nvironment has been recognized as an imperative equirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted nformation-sharing approach for government departments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of onfidential and top secret information amongst security ersonnels and government departments within the national oundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and overnment intelligence departments to avoid threatening activities. The experimental results demonstrate the ffectiveness of the proposed information sharing approach.

Authors and Affiliations

Md. Headayetullah , G. K. Pradhan

Keywords

Related Articles

Implementation and Performance Evaluation of the Gateway Discovery Approaches in the Integrated MANETInternet Scenario

The mobile ad hoc networks have become a major component of the future network development due to their ease of deployment, self-configurability, flexibility and independence on any existing network infrastructure. But...

Convergence of ART in Few Projections

Algebraic Reconstruction Technique (ART) is an iterative algorithm to obtain reconstruction from projections in a finite number of iterations. The present paper discuses the convergence achieved in small number of iterat...

GUI BASED REMOTE ON/OFF CONTROL AND MONITORING SINGLE PHASE LAMP USING MICROCONTROLLER

Microcontrollers are very popular in electronics and computer-controlled systems worldwide. This paper presents the control of a microcontroller-based system using the omputer and explains comprehensively the hardware a...

Optimal Capacitor For Maximum Output Power Tracking Of Self Excited Induction Generator Using Fuzzy Logic Approach

This paper aims to determine the optimal capacitors required for maximum output power of a single phase self excited induction generator (SEIG). This paper deals with theoretical, fuzzy logic and practical approach in or...

Statistical Approach to Transliteration from English to Punjabi

Machine transliteration plays an important role in natural language applications such as information retrieval and machine translation, especially for handling proper nouns and technical terms. Transliteration is a cruci...

Download PDF file
  • EP ID EP85404
  • DOI -
  • Views 189
  • Downloads 0

How To Cite

Md. Headayetullah, G. K. Pradhan (2010). Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach. International Journal on Computer Science and Engineering, 2(4), 1254-1265. https://europub.co.uk/articles/-A-85404