Secure and Efficient Data Sharing for Decentralized DTN

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4

Abstract

"Nowadays, there have been increasing demands and concerns for distributed data security, One of the most challenging issues in data sharing systems is the enforcement of access policies and the support of policies updates. Cipher text policy attribute-based encryption (CP-ABE) is becoming a promising cryptographic solution to this issue. It enables data owners to define their own access policies over user attributes and enforce the policies on the data to be distributed. Cipher text -policy attribute-based encryption (CP-ABE) is a guaranteeing cryptographic answer for the right to gain entrance control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. Thus a new methodology is introduced to provide successful communication between each other as well as access the confidential information provided by some major authorities like commander or other superiors. The methodology is called Disruption-Tolerant Network (DTN). This system provides efficient scenario for authorization policies and the policies update for secure data retrieval in most challenging cases. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network also we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently."

Authors and Affiliations

Keywords

Related Articles

A Clinical Study on the Prevalence of Additional Canals -MB2 and MB3in Mesiobuccal Root in Maxillary Molars

The goal of successful endodontics is the total preparation of the whole endodontic space. The success of endodontic therapy is dependent on the quality of cleaning of the entire root canal system. Varying morphology in...

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

"In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly...

Study the Heavy Metal Accumulated Pithophora Algal Compost Nutrient Content, Heavy Metals and Biogas Production

Cyanophyceaen algae as nitrogen fixers have been used in different countries for a long time, are well known as biofertilizers. The potentialities of cyanobacteria to fix atmospheric nitrogen excrete a great number of su...

An Efficient Method of Compressing Encrypted Images

In this paper proposes a novel scheme of compressing AES encrypted images. The content owner encrypts the original uncompressed images by double encryption methods. Then, the channel provider who cannot access the origin...

Data Loss Prevention: Secure Important Data & Prevent By Threats

it is very important to protect the business data from all kind of data breach attacks for every organization to maintain the brand reputation and customer faith. Security of data is the biggest challenges for the organi...

Download PDF file
  • EP ID EP366319
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

(2015). Secure and Efficient Data Sharing for Decentralized DTN. International Journal of Science and Research (IJSR), 4(4), -. https://europub.co.uk/articles/-A-366319