A Study on Secure Data Retrieval for Decentralized DTMN
P.A.N Chakravarthy , Dasari Vinay Kumar, , ,
Affiliations M.Tech (CSE), Department of Computer Science & Engineering, NRI Institute of TechnologyAssistant Professor, Department of Computer Science & Engineering, NRI Institute of Technology
DTMN advancements are getting to be a productive provision that allow remote device passed on by officers to
talk with each other and access the classified data or secret data by abusing outside storage nodes. This framework gives the
effective situation to approval strategies and the solutions overhaul for secure data recovery in most difficult cases. The most
encouraging cryptographic solutions are acquainted with control the access issues called Cipher text-Policy Attribute-Based
Encryption. Indisputably the most difficult issues in this state are the prerequisite of endorsement arrangements and the
methodologies redesign for secure data recovery. Then again, the issue of applying in decentralized DTMN presents a couple
of securities and insurance challenges as to the property disavowal, key escrow, and coordination of characteristics issued
from particular forces. In this paper, we propose a protected data recovery arrangement using for decentralized disruptiontolerant network where various key forces manage their properties freely. We display how to apply the proposed part to
securely and proficiently deal with the portrayed data scattered in the data scattered in the Interference or disruption tolerant
P.A.N Chakravarthy ,Dasari Vinay Kumar."A Study on Secure Data Retrieval for Decentralized DTMN". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 11,pp.804-808, November- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1121.pdf,
 S. Roy and M. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CPAttribute-Based Encryption) system for the DisruptionTolerant Network’s,” Lehigh CSE Tech. Rep., 2009.
 M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTMNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.
 M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc. Conf. File Storage Technol., 2003, pp. 29–42.
 A. Harrinton and C. Jensen. Cryptographic access control in a distributed file system. In Proceedings of ACM SACMAT, 2003.
 L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323.
 A. Lewko and B. Waters, “Decentralizing attributebased encryption,” Cryptology ePrint Archive: Rep. 2010/351, 2010.
 A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Eurocrypt, 2005, pp. 457–473.
 V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.