Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Implementing CP-ABE Scheme for Decentralized Disruption-Tolerant Military Networks

N.Anjali, A.Harshavardhan, , ,
Affiliations
M.Tech (CSE), Priyadarshini Institute of Technology & Science for women’s
Assistant Professor ( Dept.of CSE), Priyadarshini Institute of Technology & Science for Women’s
:NOT ASSIGNED


Abstract
Compact centre points in sure circumstances, as an example, a forefront or a hostile region area unit indebted to expertise the evil impacts of broken framework system and never-ending bundles. Intrusion tolerant framework (DTN) progressions have gotten the chance to be productive plans that enable remote contraptions passed on by troopers to speak victimization on an individual basis and provides permission to personal proof or charge unfailingly abuse outside limit centre points. Irrefutably the foremost hard problems during this circumstance area unit the approval of endorsement methodologies and their courses of action plan for secure knowledge convalescence. Figure content methodology property provides coding promise rejoinder to channel mechanism topics. Regardless, of topics to use for CP-ABE in localized Intrusion tolerant framework (DTN) presents some security and insurance difficulties regarding the standard disclaimer, fake, and direction of qualities assigned from clear forces. we have a tendency to suggest AN ensured knowledge convalescence arrangement victimization the talent for distributed DTNs anyplace varied key forces fare their dangers self-sufficiently. we offer security to {the knowledge the info the information} that we've sent victimization distributed data. it's utilized in secure transmission of information for nations defence


Citation
N.Anjali,A.Harshavardhan."Implementing CP-ABE Scheme for Decentralized Disruption-Tolerant Military Networks". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 12,pp.868-872, December - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1211.pdf,


Keywords : Access control, attribute-based encryption (ABE), disruption-tolerant network (DTN), multiauthority, secure data retrieval.

References
[1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for vehicle-based disruption tolerant networks,” in Proc.IEEE INFOCOM, 2006, pp. 1–11. 
[2] M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp.1–6. 
[3] S. Roy and. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CPABE) system for the DTNs,” Lehigh CSE Tech. 
[4] M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7. 
[5] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc.Conf. File Storage Technol., 2003, pp. 29–42. 
[6] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attributebased encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323. 
[7] N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,” In Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.
[8] D. Huang and M. Verma, “ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,” Ad Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009.
 [9] A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” Cryptology e-Print Archive: Rep. 2010/351, 2010. 
[10] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Eurocrypt, 2005, pp. 457–473.
 [11] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc.ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.


DOI Link : NOT ASSIGNED

Download :
  V2I1211.pdf


Refbacks : Currently there are no Refbacks

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to [email protected]