Preserving Data Repossession for Decentralized Disruption-Tolerant Military Networks
Seelam Sowjanya, Dr Akbar Khan, , ,
Affiliations (M.Tech) –CSE, Nimra Institute of Science & TechnologyProfessor, Dept of CSE, Nimra Institute of Science & Technology,
Disruption-tolerant network (DTN) advancements are getting to be a productive provision that allow remote
device passed on by officers to talk with each other and access the classified data or secret data by abusing outside
storage nodes. This framework gives the effective situation to approval strategies and the solutions overhaul for secure
data recovery in most difficult cases. The most encouraging cryptographic solutions are acquainted with control the access
issues called Cipher text-Policy Attribute-Based Encryption (CP-ABE). The absolute most difficult issues in this situation are
the requirement of approval solutions and the approaches upgrade for secure data recovery. On the other hand, the issue
of applying CP-ABE in decentralized DTNs presents a few securities and protection challenges as to the attribute
revocation, key escrow, and coordination of attributes issued from distinctive powers. In this paper, we propose a safe data
recovery plan utilizing CP-ABE for decentralized DTNs where numerous key powers deal with their attributes
independently. We exhibit how to apply the proposed component to securely and capably manage the characterized data
scattered in the data dispersed in the Interruption or disruption tolerant network.
Seelam Sowjanya,Dr Akbar Khan."Preserving Data Repossession for Decentralized Disruption-Tolerant Military Networks". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 11,pp.751-755, November- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1110.pdf,
 S. Roy and M. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
 M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.
 M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc. Conf. File Storage Technol., 2003, pp. 29–42.
 A. Harrinton and C. Jensen. Cryptographic access control in a distributed file system. In Proceedings of ACM SACMAT, 2003.
 L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323.
 A. Lewko and B. Waters, “Decentralizing attributebased encryption,” Cryptology ePrint Archive: Rep. 2010/351, 2010.
 A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Eurocrypt, 2005, pp. 457–473.
 V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.