CFP last date
22 April 2024
Reseach Article

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

by K. Sai Baba, A. Sandeep Kumar, B Tarakeswara Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 17
Year of Publication: 2015
Authors: K. Sai Baba, A. Sandeep Kumar, B Tarakeswara Rao
10.5120/ijca2015907683

K. Sai Baba, A. Sandeep Kumar, B Tarakeswara Rao . Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. International Journal of Computer Applications. 132, 17 ( December 2015), 15-17. DOI=10.5120/ijca2015907683

@article{ 10.5120/ijca2015907683,
author = { K. Sai Baba, A. Sandeep Kumar, B Tarakeswara Rao },
title = { Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 17 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number17/23685-2015907683/ },
doi = { 10.5120/ijca2015907683 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:29:41.631231+05:30
%A K. Sai Baba
%A A. Sandeep Kumar
%A B Tarakeswara Rao
%T Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 17
%P 15-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Disruption-tolerant network (DTN) advancements are getting to be a productive provision that allow remote device passed on by officers to talk with each other and access the classified data or secret data by abusing outside storage nodes. This framework gives the effective situation to approval strategies and the solutions overhaul for secure data recovery in most difficult cases. The most encouraging cryptographic solutions are acquainted with control the access issues called Cipher text-Policy Attribute-Based Encryption (CP-ABE). Indisputably the most difficult issues in this state are the prerequisite of endorsement arrangements and the methodologies redesign for secure data recovery. Then again, the issue of applying CP-ABE in decentralized DTNs presents a couple of securities and insurance challenges as to the property disavowal, key escrow, and coordination of characteristics issued from particular forces. In this paper, we propose a protected data recovery arrangement using CP-ABE for decentralized DTNs where various key forces manage their properties freely. We display how to apply the proposed part to securely and proficiently deal with the portrayed data scattered in the data scattered in the Interference or disruption tolerant network.

References
  1. S. Roy and M. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
  2. M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.
  3. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc. Conf. File Storage Technol., 2003, pp. 29–42.
  4. A. Harrinton and C. Jensen. Cryptographic access control in a distributed file system. In Proceedings of ACM SACMAT, 2003.
  5. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323.
  6. A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” Cryptology ePrint Archive: Rep. 2010/351, 2010.
  7. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Eurocrypt, 2005, pp. 457–473.
  8. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Co nf. Comput. Commun. Security, 2006, pp. 89–98.
Index Terms

Computer Science
Information Sciences

Keywords

Access control attribute-based encryption (ABE) disruption-tolerant network (DTN) multiauthority secure data retrieval.