Secure and Efficient Data Sharing for Decentralized DTN
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4
Abstract
"Nowadays, there have been increasing demands and concerns for distributed data security, One of the most challenging issues in data sharing systems is the enforcement of access policies and the support of policies updates. Cipher text policy attribute-based encryption (CP-ABE) is becoming a promising cryptographic solution to this issue. It enables data owners to define their own access policies over user attributes and enforce the policies on the data to be distributed. Cipher text -policy attribute-based encryption (CP-ABE) is a guaranteeing cryptographic answer for the right to gain entrance control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. Thus a new methodology is introduced to provide successful communication between each other as well as access the confidential information provided by some major authorities like commander or other superiors. The methodology is called Disruption-Tolerant Network (DTN). This system provides efficient scenario for authorization policies and the policies update for secure data retrieval in most challenging cases. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network also we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently."
Development and Organoleptic Evaluation of Jamun Juice
The present study was to formulate the jamun juice by incorporation of different level of jamun puree. The Organoleptic properties of the formulated juice like color, appearance, flavor, viscosity, taste and over all acc...
Enhanced Mobile Robot for Detection of Water Quality
Water quality monitoring is very essential in recent years since many factors pollute the water resources. The robots that are in use for monitoring the water quality that is unable to protect itself from damage. The dat...
Internal Fixation of Displaced Proximal Humerus Fractures Using PHILOS: A Prospective Study
Abstract: Background: Proximal humeral fractures requiring surgical stabilization remain a therapeutic challenge particularly in elderly patients with unstable fracture types and diminished bone quality. Achieving stable...
"The Indian stock market, which mainly consists of the BSE (Bombay stock exchange) and the NSE (National stock exchange), is one of the fastest growing emerging markets in the world. Technical analysis is a method of predicting changing movements of price and future stock trends by studying historical data. The initial data for a technical analysis are prices: the highest and the lowest prices, th
"The Indian stock market, which mainly consists of the BSE (Bombay stock exchange) and the NSE (National stock exchange), is one of the fastest growing emerging markets in the world. Technical analysis is a method of pre...
On Automatic Continuity in the Jordan-Banach Algebras
In this work, we are interested in continuity of Homomorphisms in the complete normalized Jordan algebras. With this intention, we extend from the results known in the case of the Banach algebras to the complete normaliz...