CFP last date
20 May 2024
Reseach Article

Attribute-based Secure Data Retrieval Scheme using CP-ABE

Published on November 2015 by Dhanshree K. Bhure
National Conference on Recent Trends in Mobile and Cloud Computing
Foundation of Computer Science USA
NCRMC2015 - Number 1
November 2015
Authors: Dhanshree K. Bhure
a5e6c984-0127-461a-9c94-351e0464e985

Dhanshree K. Bhure . Attribute-based Secure Data Retrieval Scheme using CP-ABE. National Conference on Recent Trends in Mobile and Cloud Computing. NCRMC2015, 1 (November 2015), 10-13.

@article{
author = { Dhanshree K. Bhure },
title = { Attribute-based Secure Data Retrieval Scheme using CP-ABE },
journal = { National Conference on Recent Trends in Mobile and Cloud Computing },
issue_date = { November 2015 },
volume = { NCRMC2015 },
number = { 1 },
month = { November },
year = { 2015 },
issn = 0975-8887,
pages = { 10-13 },
numpages = 4,
url = { /proceedings/ncrmc2015/number1/23309-2902/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Mobile and Cloud Computing
%A Dhanshree K. Bhure
%T Attribute-based Secure Data Retrieval Scheme using CP-ABE
%J National Conference on Recent Trends in Mobile and Cloud Computing
%@ 0975-8887
%V NCRMC2015
%N 1
%P 10-13
%D 2015
%I International Journal of Computer Applications
Abstract

In the large number of outgrowing commercial environment each and everything depends on the other sources To transmit the data securely and maintain the data as well in the regular medium. in that Disruption-tolerant network (DTN) innovations are getting to be fruitful access data or secret data or summon dependably by abusing outside capacity nodes or storage nodes. Are wireless device carried to communicate with each other and access confidential information Other new methods for secure data retrieval (CP-ABE) policy Cipher text -policy attribute-based encryption (CP-ABE) is a guaranteeing cryptographic answer for the right to gain entrance control issues. The secure data retrieval system is mostly useful for military purpose to access confidential data over the solders.

References
  1. M. Chuah and P. Yang, "Node density-based adaptive routing scheme for disruption tolerant networks," in Proc. IEEE MILCOM, 2006, pp. 1–6.
  2. M. M. B. Tariq, M. Ammar, and E. Zequra, "Mesage ferry route design for sparse ad hoc networks with mobile nodes," in Proc. ACMMobiHoc, 2006, pp. 37–48.
  3. M. Chuah and P. Yang, "Performance evaluation of content-based information retrieval schemes for DTNs," in Proc. IEEE MILCOM, 2007, pp. 17.
  4. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in Proc. Conf. File Storage Technol. , 2003, pp. 29–42.
  5. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker,"Mediated cipher text-policy attribute-based encryption and its application," in Proc. WISA, 2009, LNCS 5932, pp. 309–323.
  6. J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, "Maxprop:Routing for vehicle-based disruption tolerant networks," in Proc. IEEE INFOCOM, 2006, pp. 1–11.
  7. M. Chuah and P. Yang, "Node density-based adaptive routing schemefor disruption tolerant networks," inProc. IEEE MILCOM, 2006, pp. 1–6.
  8. M. M. B. Tariq,M. Ammar,andE. Zequra,"Mesage ferry route design for sparse ad hoc networks with mobile nodes," inProc. ACMMobiHoc, 2006, pp. 37–48.
  9. S. Roy and M. Chuah, "Secure data retrieval based on ciphertext policyattribute-based encryption (CP-ABE) system for the DTNs," LehighCSE Tech. Rep. , 2009.
  10. J. Bethencourt, A. Sahai, and B. Waters, "Ciphertextpolicy attributebased encryption," in Proc. IEEE Symp. Security Privacy, 2007, pp. 321–334.
Index Terms

Computer Science
Information Sciences

Keywords

(cp) - Cipher Text Based (abe) Attribute-based Encryption. Secure Data Retrieval System.