A System for Secured Data Retrieval in Hostile Regions using CP-ABE Based in Ad Hoc Disruption- Tolerant Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 1
Abstract
Generally Networks operated in ad hoc mode suffer isolated network connectivity in the Hostile Military environments like battlefield. Deployment of Disruption-tolerant networks (DTN) enhances the connectivity between wireless devices carried by soldiers in battle field, this provides them to communicate effectively and share the information confidently. Cipertext -policy attribute based encryption (CP-ABE) is effective cryptographic technique to access control issues. Ad hoc network are decentralized and resource constrained networks, applying CP-ABE to such networks is a challenging issue, in turn it introduces new security and privacy issues related to attribute revocation, coordination of attributes, and key escrow. This paper mainly focuses on a secure data collection mechanism using CP-ABE for ad hoc DTNs where more than one key authority manages their attributes dynamically and independently. We analyzed the proposed mechanism and applied to the disruptiontolerant military network to access the information securely.
Authors and Affiliations
A. Radhika| Sr.Asst.Professor, Dept. of CSE, D. VaraLaxmi| M.Tech(CS),Dept. of CSE, S.R.K Instt. Of Technology Andhra Pradesh, INDIA
Transformer less Series Active Filter for Power Quality Improvement
To upgrade the power quality in singlestage frameworks with critical loads a transformer less hybrid series dynamic channel is proposed . This venture helps the energy administration and power quality issues identifie...
Explication Search Results From Huge Amount Of Published Data
The Internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexi...
Novel Protocol for Efficient And Secure Communication In DWSN
Rising wireless sensor system is a mix of High sensors and Low sensors which is sent in various sort of utilizations like military, patient observing and backwoods checking. In this sensor system sensors are moved on...
A Novel Attack Methods For Inferring On Certain Url’s On Twitter
Twitter is a well-known online informal organization benefit for sharing short messages (tweets) among friends. Its clients regularly utilize URL shortening administrations that give (i) a short false name of a long...
Key-Aggregate Model Search for Group Data Sharing Using PatientControlled Encryption In Cloud
Cloud storage has risen as a promising tackling an issue for giving universal, helpful, and onrequest gets to a lot of information shared over the Internet. Specifically, our plans give the main open key patient-contr...