CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Survey on Secure Data Retrieval Techniques for Military Networks

by Roshni Khodke, V.N. Dhawas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 135 - Number 13
Year of Publication: 2016
Authors: Roshni Khodke, V.N. Dhawas
10.5120/ijca2016908574

Roshni Khodke, V.N. Dhawas . Survey on Secure Data Retrieval Techniques for Military Networks. International Journal of Computer Applications. 135, 13 ( February 2016), 36-38. DOI=10.5120/ijca2016908574

@article{ 10.5120/ijca2016908574,
author = { Roshni Khodke, V.N. Dhawas },
title = { Survey on Secure Data Retrieval Techniques for Military Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 135 },
number = { 13 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 36-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume135/number13/24112-2016908574/ },
doi = { 10.5120/ijca2016908574 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:35:44.871776+05:30
%A Roshni Khodke
%A V.N. Dhawas
%T Survey on Secure Data Retrieval Techniques for Military Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 135
%N 13
%P 36-38
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor network is having shared nature due to this security is one of the crucial feature for the network users. In commercial environment the whole thing depends on the other resource to transmit the data securely and retain the data as well in the regular medium. Transfer of data are done through intermediate node, hence data may loss due to the unauthorized persons. Mobile nodes in military environments like in battlefield region are likely to suffer from discontinuous network connectivity and frequent partitions. To solve this issue Disruption-tolerant network (DTN) is a technology which allows the node to communicate with each other access confidential information in secure manner. Most of the challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. This paper is motivated by need of data retrieval in wireless network in secure manner. In existing system an attacker can attack the single key authority and can steal all the keys which threaten the system from security perspective. So in proposed system building multiple key authorities from where individual keys should be drawn. For efficient key generation and distribution point of view using ECC algorithm which can be more robust and secure. This algorithm is also time and energy aware.

References
  1. Junbeom Hur and Kyungtae Kang,” Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks”, IEEE, ACM,2014.
  2. J. Bethencourt, A. Sahai, and B. Waters,“Ciphertext-policy attribute based encryption,” in Proc. IEEE Symp. Security Privacy, 2007,pp.321–334.
  3. M. Chase and S. S. M. Chow, “Improving privacy and security in multiauthority attribute-based encryption,” in Proc. ACM Conf. Comput.Commun. Security, 2009, pp. 121–130.
  4. S. Roy and M. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
  5. J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for vehicle-based disruption tolerant networks,” in Proc. IEEE INFOCOM, 2006, pp. 1–11.
  6. M. Chuah and P. Yang,“Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.
  7. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc. Conf. File Storage Technol., 2003, pp. 29–42.
  8. R. Ostrovsky, A. Sahai, and B. Waters,“Attribute-based encryption with non-monotonic access structures,” in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 195–203.
  9. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
  10. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker,“Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless network DTN multiauthority secure data retrieval.