ADVANCED APPROACH FOR SECURE RETRIEVAL OF DATA IN DISRUPTION TOLERANT MILITARY NETWORKS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 7
Abstract
Communication nodes in military environments such as a battleground regions are likely to suffer from connectivity issues in various locations in a battle field. Disruption-tolerant network (DTN) technologies are becoming promising solutions that allow wireless devices which the soldiers carry to communicate with each other and access the confidential information Some of the most facing issues in this area is the enforcement of Authorization policies and the policies update for secure data retrieval. Cipher text-policy attribute-based encryption (CP-ABE) is a powerful cryptographic solution to the access control issues in a secure environment. However, the problem of applying CPABE in decentralized in this paper we solve the issue of security and privacy challenges such as key escrow, attribute revocation and coordination of attributes issued by different authorities. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data by providing unique security measure using certificates by protecting the systems used and authorizing the system network.
Authors and Affiliations
Divina T. K Premdas
Comparative Study of Test Prioritization Testing Technique
Testing of software is an important means of assessing the software to determine its quality. Testing activities support quality assurance by gathering information about the nature of the software being studied. S...
Set Partitioning in Hierarchical Trees (SPIHT)
A very effective and computationally simplest technique for image compression is Embedded Zerotree Wavelet(EZW)coding. here we defined an alternative principle of an operation of im principles are partial orderin...
Authenticate the Centralized Network Using NIS(Network Information System)
Security is the degree of resistance to, or protection from, harm and illegal accessing the services networks. NIS server used for high security in LINUX or another environment. NIS, or Network Information Systems, is...
A METHOD TO OBTAIN THE POSITION RELATION OF TWO POLYGONAL CONTOURS DEFINED BY PRIMITIVES IN THE SAME PLANE
This p aper presents an original method for determination position relation between two polygonal coplain contours used an original algorithm proposed by author for determination the position relation of a point wit...
A Survey on Web Crawling Techniques by Emphasizing Path-mounting crawling
The World Wide Web (WWW) is being prolonged by an impulsive speed. As a result, search engines encounter many challenges such as yielding accurate and conversant results to the users, and responding them in an ap...