shielded data regeneration for decentralized interruption – endured military web

Kavipriya E,

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:1         Year: 05 July,2016         Pages:1087-1091

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

In military networks, the soldiers carry wireless devices that may be temporarily disconnected by environmental factors, especially when they are used in hostile environments. For this, Disruption-Tolerant Network (DTN) is a profitable solution that helps a node to communicate with one another and access the confidential information by exploiting outside storage services. Probably the most difficult issues in this situation are the need of authorization polices and the policies redesign for secure information recovery. Cipher text- Policy Attribute–Based Encryption (CP-ABE) is a guaranteeing cryptographic solution to the access control issues. In any case, the problem of applying CP-ABE in decentralized DTNs provides a several security and protection challenges such as property revocation, key escrow, and co-ordination of characteristics (attributes) issued from different authorities. In this case a secure data retrieval scheme is proposing a safe information recovery plan obtaining CP-ABE for decentralized DTNs where numerous key authorities deal with their attributes autonomously. The proposing mechanism demonstrates to deal the secured information dispersed in the Disruption-Tolerant Military Network safely and efficiently. And also demonstrates secret file sharing among the key authorities.

Kewords

Disruption Tolerant Network, CP-ABE, Key escrow

Reference

#1. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, "Maxprop: Routing for vehicle-based disruption tolerant networks," inProc. IEEE INFOCOM, 2006, pp. 1-11. #2.M. Chuah and P. Yang, "Performance evaluation of content-based information retrieval schemes for DTNs," in Proc. IEEE MILCOM, 2007, pp. 1-7. #3. A. Lewko and B. Waters, “Decentralizing attributebasedencryption”, Cryptology e-Print Archive:Rep.2010/351, 2010. #4.A. Boldyreva, V. Goyal, and V. Kumar, “Identity-Based Encryptionwith Efficient Revocation,” Proc. ACM Conf. Computer and Comm. Security, pp. 417-426, 2008. #5.R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-Based Encryption with Non-Monotonic Access Structures,” Proc. ACM Conf. Computer and Comm. Security, pp. 195-203, 2007. #6.V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,”Proc. ACM Conf. Computer and Comm. Security, pp. 89-98, 2006. #7.P. Golle, J. Staddon, M. Gagne, and P. Rasmussen, “A content-driven access control system,” in Proc. Symp.Identity Trust Internet, 2008,pp. 26–35. #8.L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,”in Proc. ACM Conf. Comput.Communication Security, 2007, pp. 456– 465. #9.D. Huang and M. Verma, “ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,” AdHocNetw., vol. 7, no. 8, pp. 1526–1535, 2009. #10.Sergio M. Tornell, Carlos T, Calafate, Juan-Carlos Cano, Pietro Manzoni “Assessing the Effectiveness of DTN Techniques Under Realistic Urban Environments “in Proc IEEE 38th Conference on Local Computer Networks, 2013, pp. 573-580.