http://www.ijrcct.org/index.php/ojs/article/download/1245/pdf

Abstract

It is pleasing to offer differentiated access services such thatdata access policies are distinct over user attributes or roles,which are direct by the key authorities. We propose a securedata recovery scheme using CP-ABE for decentralized DTNswhere manifold key authorities supervise their attributes by you.We make obvious how to be valid the proposed mechanism tofirmly and capablysupervise the not to be disclosed data scatteredin the disruption-tolerant military network. Mobile nodes in military environments such as abattlefield or a hostile region are expected to endure from discontinuous network connectivity and regular partitions. Disruption-tolerantnetwork (DTN) technologies are flattering successful solutionsthat allow wireless devices carried by soldiers to conversewith each other and right of entry the secret information or commandconsistently by exploiting external storage nodes. Some of themost demanding issues in this situation are the enforcement ofauthorization policies and the ruleinform for secure datarecovery.

Authors and Affiliations

G. Aruna Rekha, S. Indira Spandana

Keywords

Related Articles

A survey on Secure localization with Intrusion Detection System in WSN

In the current scenario Wireless Sensor Network (WSN) is an emerging area for research work. The localization of WSN is an important feature from the researchers point of view. So Security is a major concern in WSN to...

Improved Diversity with Limited Feed back for more than two users

We consider interference cancellation for a system with more than two users when users know each other channels. The goal is to utilize multiple antennas to cancel the interference without sacrificing the diversity or...

A Novel Soft Communicating Full Bridge Bidirectional Isolated Dc-Dc Converter for an Energy Storage System with Galvanic Isolation Using Electric Double Layer Capacitor

This paper shows the investigation of bidirectional DC to DC converter and contrasting and the different existing strategy methods. The proposed converter is planned in the way of shut circle control. By utilizing a...

A Novel Approach for Finding Optimal Overlay Nodes In Routing

In networks to enhance the TCP throughput and postponement Overlay steering procedure is proposed.one of the primary point of interest of this method it doesn't have to change current directing technique. Yet, arrang...

An Efficient Method for Steganography in Videos

This paper applies steganography algorithm in videos. In proposed method we are hiding the data in a compressed video by using optimal pixel adjustment process (OPAP). Secrete Message is first encrypted by using cryp...

Download PDF file
  • EP ID EP28294
  • DOI -
  • Views 287
  • Downloads 2

How To Cite

G. Aruna Rekha, S. Indira Spandana (2015). http://www.ijrcct.org/index.php/ojs/article/download/1245/pdf. International Journal of Research in Computer and Communication Technology, 4(10), -. https://europub.co.uk/articles/-A-28294