Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Preserving Data Repossession for Decentralized Disruption-Tolerant Military Networks

Seelam Sowjanya, Dr Akbar Khan, , ,
Affiliations
(M.Tech) –CSE, Nimra Institute of Science & Technology
Professor, Dept of CSE, Nimra Institute of Science & Technology,
:NOT ASSIGNED


Abstract
Disruption-tolerant network (DTN) advancements are getting to be a productive provision that allow remote device passed on by officers to talk with each other and access the classified data or secret data by abusing outside storage nodes. This framework gives the effective situation to approval strategies and the solutions overhaul for secure data recovery in most difficult cases. The most encouraging cryptographic solutions are acquainted with control the access issues called Cipher text-Policy Attribute-Based Encryption (CP-ABE). The absolute most difficult issues in this situation are the requirement of approval solutions and the approaches upgrade for secure data recovery. On the other hand, the issue of applying CP-ABE in decentralized DTNs presents a few securities and protection challenges as to the attribute revocation, key escrow, and coordination of attributes issued from distinctive powers. In this paper, we propose a safe data recovery plan utilizing CP-ABE for decentralized DTNs where numerous key powers deal with their attributes independently. We exhibit how to apply the proposed component to securely and capably manage the characterized data scattered in the data dispersed in the Interruption or disruption tolerant network.


Citation
Seelam Sowjanya,Dr Akbar Khan."Preserving Data Repossession for Decentralized Disruption-Tolerant Military Networks". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 11,pp.751-755, November- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1110.pdf,


Keywords : Access control, attribute-based encryption (ABE), disruption-tolerant network (DTN), multiauthority, secure data retrieval.

References
[1] S. Roy and M. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009. 
[2] M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7. 
[3] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc. Conf. File Storage Technol., 2003, pp. 29–42. 
[4] A. Harrinton and C. Jensen. Cryptographic access control in a distributed file system. In Proceedings of ACM SACMAT, 2003.
 [5] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323.
[6] A. Lewko and B. Waters, “Decentralizing attributebased encryption,” Cryptology ePrint Archive: Rep. 2010/351, 2010. 
[7] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Eurocrypt, 2005, pp. 457–473. 
[8] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.


DOI Link : NOT ASSIGNED

Download :
  V2I1110.pdf


Refbacks : Currently there are no Refbacks

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to [email protected]