http://www.ijrcct.org/index.php/ojs/article/download/1245/pdf
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
It is pleasing to offer differentiated access services such thatdata access policies are distinct over user attributes or roles,which are direct by the key authorities. We propose a securedata recovery scheme using CP-ABE for decentralized DTNswhere manifold key authorities supervise their attributes by you.We make obvious how to be valid the proposed mechanism tofirmly and capablysupervise the not to be disclosed data scatteredin the disruption-tolerant military network. Mobile nodes in military environments such as abattlefield or a hostile region are expected to endure from discontinuous network connectivity and regular partitions. Disruption-tolerantnetwork (DTN) technologies are flattering successful solutionsthat allow wireless devices carried by soldiers to conversewith each other and right of entry the secret information or commandconsistently by exploiting external storage nodes. Some of themost demanding issues in this situation are the enforcement ofauthorization policies and the ruleinform for secure datarecovery.
Authors and Affiliations
G. Aruna Rekha, S. Indira Spandana
A survey on Secure localization with Intrusion Detection System in WSN
In the current scenario Wireless Sensor Network (WSN) is an emerging area for research work. The localization of WSN is an important feature from the researchers point of view. So Security is a major concern in WSN to...
Improved Diversity with Limited Feed back for more than two users
We consider interference cancellation for a system with more than two users when users know each other channels. The goal is to utilize multiple antennas to cancel the interference without sacrificing the diversity or...
A Novel Soft Communicating Full Bridge Bidirectional Isolated Dc-Dc Converter for an Energy Storage System with Galvanic Isolation Using Electric Double Layer Capacitor
This paper shows the investigation of bidirectional DC to DC converter and contrasting and the different existing strategy methods. The proposed converter is planned in the way of shut circle control. By utilizing a...
A Novel Approach for Finding Optimal Overlay Nodes In Routing
In networks to enhance the TCP throughput and postponement Overlay steering procedure is proposed.one of the primary point of interest of this method it doesn't have to change current directing technique. Yet, arrang...
An Efficient Method for Steganography in Videos
This paper applies steganography algorithm in videos. In proposed method we are hiding the data in a compressed video by using optimal pixel adjustment process (OPAP). Secrete Message is first encrypted by using cryp...