Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing nvironment has been recognized as an imperative equirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted nformation-sharing approach for government departments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of onfidential and top secret information amongst security ersonnels and government departments within the national oundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and overnment intelligence departments to avoid threatening activities. The experimental results demonstrate the ffectiveness of the proposed information sharing approach.
Authors and Affiliations
Md. Headayetullah , G. K. Pradhan
An Extensive Study on the Future of Modeling in Software Development
In recent years, software modeling realized much attention in the field of software research and development due to demonstrating the capability of decreases time and cost of software development and also improves overal...
Class hierarchy method to find Change-Proneness
Finding Proneness of software is necessary to identify fault rone and change prone classes at earlier stages of development, so that those classes can be given special ttention. Also to improves the quality and reliabili...
Generating Customer Profiles for Retail Stores Using Clustering Techniques
The retail industry collects huge amounts of data on sales, customer buying history, goods transportation, consumption, and service. With increased availability and ease of use of modern computing technology and e-commer...
A Study on Similarity Computations in Template Matching Technique for Identity Verification
This paper describes a study on the development of a human face verification system by merely using template matching (TM) as the main verification engine. In contrast to common face recognition techniques, our approach...
An Overview of Side Channel Attacks and Its Countermeasures using Elliptic Curve Cryptography
In order to provide security the electronic devices and their execution systems contain implementations of cryptographic algorithms. This paper explains basic level of side channel attacks and their countermeasure. These...