SECURE CIPHER TEXT POLICY FOR MILITARY

Abstract

Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity. Disruption - tolerant network (DTN) technol ogies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information. Disruption - tolerant network (DTN) technologies are becoming successful solutions that allow nod es to communicate with each other in this extreme networking environment. The concept of attribute - based encryption (ABE) is a promising approach that fulfils the requirements for secure data retrieval in DTNs. Especially, Ciphertext - Policy ABE (CP - ABE) pr ovides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy .

Authors and Affiliations

Shazia Saleem , Raafiya Gulmeher

Keywords

Related Articles

 Enhancement the Performance of Condenser of Split type Air Conditioning System by using Evaporative Cooling: A Review

 The improvement of coefficient of performance and reduction of energy consumption of a split air conditioning system. When retrofitted with evaporative cooling in the condenser of split air conditioner is reviewed...

 Comparative Study: Performance of SCTP with Competing Flows of the TCP over a Wired Network

 The Stream Control Transmission Protocol has many features such as multi-streaming and multi-homing, and based on these features that enable to deal with multimedia applications. Therefore, it has become possible...

A STUDY TO IDENTIFY THE FACTORS AFFECTING EMPLOYEE TURNOVER IN SMALL SCALE INDUSTRIES

Now-a-days small scale industries play a very vital role to develop the economy of the country. In this vital segment of Indian economy i.e. a developing country, these types of industries becomes more crucial although E...

Computer Science and E

Ethics justifies about the status of task whether it is correct or not , with this it includes the factor of social adoption i .e. what we do . This paper involves the review study of various ethics themes like computer...

 BRAIN MACHINE INTERFACING WITH IoT FUNTIONALITY

 Brain dead people and people having any disability related to brain cannot normally communicate with others and for their betterment some electronic need to be developed and Brain Machine Interfacing (BMI) is...

Download PDF file
  • EP ID EP122183
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

Shazia Saleem, Raafiya Gulmeher (30). SECURE CIPHER TEXT POLICY FOR MILITARY. International Journal of Engineering Sciences & Research Technology, 4(6), 97-101. https://europub.co.uk/articles/-A-122183