Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing nvironment has been recognized as an imperative equirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted nformation-sharing approach for government departments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of onfidential and top secret information amongst security ersonnels and government departments within the national oundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and overnment intelligence departments to avoid threatening activities. The experimental results demonstrate the ffectiveness of the proposed information sharing approach.

Authors and Affiliations

Md. Headayetullah , G. K. Pradhan

Keywords

Related Articles

Analysis of Selective Routing Strategies for Fault Tolerance In Wireless Sensor Networks

Wireless sensor networks are intended to have large number of sensor nodes which are widely deployed in a distributed environment. Steep increase in number of nodes, which is a deviant to WSN eventually, affects the comm...

An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks

In mobile ad hoc networks (MANETs), every node overhears every data transmission occurring in its vicinity and thus consumes energy unnecessarily. Although lots of research has been done on energy efficiency remains it i...

IMPROVED PART IDENTIFICATION AND REQUISITION USING 3D ILLUSTRATED PARTS CATALOGUES IN AEROSPACE AND DEFENSE

Part identification and requisition is being carried out in aerospace and defense using Illustrated Parts Catalogues that are in hardcopy format. This paper introduces the concept of 3D Illustrated Parts Catalogues, whic...

Scalability Performance of MANET Routing Protocols with Reference to Variable Pause Time

As mobile networking continues to experience increasing popularity, the need to connect large numbers of wireless devices will become more prevalent. Many recent proposals for ad hoc routing have certain characteristics....

Provide a method to Prediction of nodes movement to optimize Routing Algorithms in Ad Hoc Networks

Ad hoc networks have been of great interest among scholars of the field, due to their flexibility, quick setup, high potentiality, and also their application in the battle field, fire, earthquakes, where there is no hope...

Download PDF file
  • EP ID EP85404
  • DOI -
  • Views 198
  • Downloads 0

How To Cite

Md. Headayetullah, G. K. Pradhan (2010). Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach. International Journal on Computer Science and Engineering, 2(4), 1254-1265. https://europub.co.uk/articles/-A-85404