CFP last date
20 May 2024
Reseach Article

Secure Data Retrieval for Decentralized Military Networks

by Karishma S. Dule, M.b. Nagori
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 8
Year of Publication: 2015
Authors: Karishma S. Dule, M.b. Nagori
10.5120/20356-2548

Karishma S. Dule, M.b. Nagori . Secure Data Retrieval for Decentralized Military Networks. International Journal of Computer Applications. 116, 8 ( April 2015), 18-21. DOI=10.5120/20356-2548

@article{ 10.5120/20356-2548,
author = { Karishma S. Dule, M.b. Nagori },
title = { Secure Data Retrieval for Decentralized Military Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 8 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number8/20356-2548/ },
doi = { 10.5120/20356-2548 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:32.562668+05:30
%A Karishma S. Dule
%A M.b. Nagori
%T Secure Data Retrieval for Decentralized Military Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 8
%P 18-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Portable nodes in military environments, for example, as in battlefield or an unfriendly area are prone to experience the under go of irregular system network and frequent partitions. Interruption tolerant network (ITN) innovations are getting to be fruitful results that permit remote device conveyed by officers to speak with one another and access the secret data or summon dependably by abusing outside capacity nodes. Possibly the most solid issues in this situation are the necessity of approval arrangements and the strategies redesign for secure information recovery. This paper considers an attribute-based secure data retrieval scheme using CP-ABE for ITNs where multiple key authorities manage their attributes independently. Immediate attribute repeal enhances backward/forward secrecy of confidential data by reducing the windows of vulnerability. Key escrow problem is resolved by an escrow-free key issuing protocol that utilizes the characteristic of the decentralized ITN architecture proposed a decentralized approach; their technique does not authenticate users. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Interruption-tolerant military network.

References
  1. J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, "Maxprop: Routing for vehicle-based disruption tolerant networks," in Proc. IEEE INFOCOM, 2006, pp. 1–11.
  2. M. Chuah and P. Yang, "Node density-based adaptive routing scheme for disruption tolerant networks," in Proc. IEEE MILCOM, 2006, pp. 1–6.
  3. M. M. B. Tariq, M. Ammar, and E. Zequra, "Mesage ferry route design for sparse ad hoc networks with mobile nodes," in Proc. ACMMobiHoc, 2006, pp. 37–48.
  4. S. Roy andM. Chuah, "Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs," Lehigh CSE Tech. Rep. , 2009.
  5. M. Chuah and P. Yang, "Performance evaluation of content-based information retrieval schemes for DTNs," in Proc. IEEE MILCOM, 2007, pp. 17.
  6. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in Proc. Conf. File Storage Technol. , 2003, pp. 29–42.
  7. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker,"Mediated cipher text-policy attribute-based encryption and its application," in Proc. WISA, 2009, LNCS 5932, pp. 309–323.
  8. N. Chen, M. Gerla, D. Huang, and X. Hong, "Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption," in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.
  9. D. Huang and M. Verma, "ASPE: Attribute-based secure policy enforcementin vehicular ad hoc networks," Ad Hoc Netw. , vol. 7, no. 8, pp. 1526–1535, 2009.
  10. A. Lewko and B. Waters, "Decentralizing attribute-based encryption," Cryptology ePrint Archive: Rep. 2010/351, 2010.
  11. A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. Eurocrypt, 2005, pp. 457–473.
  12. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
  13. J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE Symp. Security Privacy, 2007, pp. 321–334.
Index Terms

Computer Science
Information Sciences

Keywords

Access-control Attribute-based encryption (ABE) Interruption-tolerant Network (ITN) Multiauthority Secure Data Retrieval.