http://www.ijrcct.org/index.php/ojs/article/download/1245/pdf
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
It is pleasing to offer differentiated access services such thatdata access policies are distinct over user attributes or roles,which are direct by the key authorities. We propose a securedata recovery scheme using CP-ABE for decentralized DTNswhere manifold key authorities supervise their attributes by you.We make obvious how to be valid the proposed mechanism tofirmly and capablysupervise the not to be disclosed data scatteredin the disruption-tolerant military network. Mobile nodes in military environments such as abattlefield or a hostile region are expected to endure from discontinuous network connectivity and regular partitions. Disruption-tolerantnetwork (DTN) technologies are flattering successful solutionsthat allow wireless devices carried by soldiers to conversewith each other and right of entry the secret information or commandconsistently by exploiting external storage nodes. Some of themost demanding issues in this situation are the enforcement ofauthorization policies and the ruleinform for secure datarecovery.
Authors and Affiliations
G. Aruna Rekha, S. Indira Spandana
Detection and management of SPIT calls in VoiceOver-IP Services
Voice over IP (VoIP) technology has become a key role in the development for providing telephony services at a lower cost with a higher flexibility. VoIP services are faced with several security issues and threats such...
A Game Theory To Load Balancing Strategy To Improve The Efficiency In Public Cloud Environment
Good load balancing makes cloud computing more proficient and increases user satisfaction. At present cloud computing is one of the utmost platforms which deliver storage of data in very lowers cost and accessible fo...
A Review on Password Cracking Strategies
As the word itself implies, Personal Account Security S ystem WORD (PASS WORD) is a word or string of characters used for user authentication to prove identity. But now passwords are going cracked to gain unauthoriz...
A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam
In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then r...
Review Paper on Diagnosis of increased risk of heart failure by using a dynamic risk scores
we are living in the world of technology and there is large number of disorders these days. Heart failure is amongst one of them. Heart failure (HF), often called congestive heart failure (CHF) or congestive cardiac...