Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing nvironment has been recognized as an imperative equirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted nformation-sharing approach for government departments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of onfidential and top secret information amongst security ersonnels and government departments within the national oundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and overnment intelligence departments to avoid threatening activities. The experimental results demonstrate the ffectiveness of the proposed information sharing approach.

Authors and Affiliations

Md. Headayetullah , G. K. Pradhan

Keywords

Related Articles

Comparative Study of Static Task Scheduling Algorithms for Heterogeneous Systems

On the distributed or parallel heterogeneous computing systems, an application is usually decomposed into several interdependent sets of co-operating subtasks and assigned to a set of available processors for execution....

Medical Image Matching and Retrieval using Discrete Sine Transform

Visual information has been extensively used in the areas of multimedia, medical imaging and other numerous applications. Management of these visual information is challenging as the quantity of data available is very hu...

MESSAGE INDUCED SOFT CHEKPOINTING FOR RECOVERY IN MOBILE ENVIRONMENTS

Checkpointing is one of the commonly used techniques to provide fault tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are cons...

Collaborative Filtering Based Recommendation System: A survey

the most common technique used for recommendations is collaborative filtering. Recommender systems based on collaborative filtering predict user preferences for products or services by learning past user-item relationshi...

WSLA Schema for Functionality Based Weight fixing of Non-Functional Parameters of Web Services

Recently Web services have evolved as a cost-effective solution for exchanging information between distributed applications over different operating system, platform, and software environment. The success of such a syste...

Download PDF file
  • EP ID EP85404
  • DOI -
  • Views 123
  • Downloads 0

How To Cite

Md. Headayetullah, G. K. Pradhan (2010). Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach. International Journal on Computer Science and Engineering, 2(4), 1254-1265. https://europub.co.uk/articles/-A-85404