Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing nvironment has been recognized as an imperative equirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted nformation-sharing approach for government departments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of onfidential and top secret information amongst security ersonnels and government departments within the national oundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and overnment intelligence departments to avoid threatening activities. The experimental results demonstrate the ffectiveness of the proposed information sharing approach.

Authors and Affiliations

Md. Headayetullah , G. K. Pradhan

Keywords

Related Articles

MOEMS Ring Resonators and Waveguides an Optical Approach

WDM networks use high speed MOEMS ring resonators. Due to the substrate loss the regular tuning of the rings is not possible, hence we need a specialized tuning element for the same. As the advantages increases so does t...

Evolutionary Aspects Of Windows Operating System To Enhance Existing Technology

The evolutionary trends in windows technology tends to hange since from the beginning including kernel, Graphical (GUI), Device drivers, interfaces etc. This paper presents a brief and comprehensive statistical analysis...

INCREASING THE EFFICIENCY OF THE SOFTWARE RCHITECTURE RECOVERY THROUGH SPANNING TREE BASED MAXIMAL GRAPH MINING TECHNIQUE

This paper represents a technique for recovering the Software Architecture based on Graph Pattern Matching by the help of mining techniques. enerally Software Architecture is represented in terms of graphs with set of...

A Relative Study on Retinal Vessel Segmentation

Retinal image processing is a standard medical repetition and offers number of profitable products for physicians. In the field of retinal image processing retinal vessel segmentation is the crucial task for detection of...

Review on Recent Image Segmentation Techniques

Image Segmentation refers to the process of partitioning an image into non-overlapping different regions with similar attributes, for gray level images, the most basic attribute used is the luminance amplitude, and for c...

Download PDF file
  • EP ID EP85404
  • DOI -
  • Views 186
  • Downloads 0

How To Cite

Md. Headayetullah, G. K. Pradhan (2010). Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach. International Journal on Computer Science and Engineering, 2(4), 1254-1265. https://europub.co.uk./articles/-A-85404