A Study on Secure Data Retrieval for Decentralized DTMN
P.A.N Chakravarthy , Dasari Vinay Kumar, , ,
Affiliations M.Tech (CSE), Department of Computer Science & Engineering, NRI Institute of TechnologyAssistant Professor, Department of Computer Science & Engineering, NRI Institute of Technology
DTMN advancements are getting to be a productive provision that allow remote device passed on by officers to
talk with each other and access the classified data or secret data by abusing outside storage nodes. This framework gives the
effective situation to approval strategies and the solutions overhaul for secure data recovery in most difficult cases. The most
encouraging cryptographic solutions are acquainted with control the access issues called Cipher text-Policy Attribute-Based
Encryption. Indisputably the most difficult issues in this state are the prerequisite of endorsement arrangements and the
methodologies redesign for secure data recovery. Then again, the issue of applying in decentralized DTMN presents a couple
of securities and insurance challenges as to the property disavowal, key escrow, and coordination of characteristics issued
from particular forces. In this paper, we propose a protected data recovery arrangement using for decentralized disruptiontolerant network where various key forces manage their properties freely. We display how to apply the proposed part to
securely and proficiently deal with the portrayed data scattered in the data scattered in the Interference or disruption tolerant
P.A.N Chakravarthy ,Dasari Vinay Kumar."A Study on Secure Data Retrieval for Decentralized DTMN". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 11,pp.804-808, November- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1121.pdf,
 S. Roy and M. Chuah, â€œSecure data retrieval based on ciphertext policy attribute-based encryption (CPAttribute-Based Encryption) system for the DisruptionTolerant Networkâ€™s,â€ Lehigh CSE Tech. Rep., 2009.
 M. Chuah and P. Yang, â€œPerformance evaluation of content-based information retrieval schemes for DTMNs,â€ in Proc. IEEE MILCOM, 2007, pp. 1â€“7.
 M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, â€œPlutus: Scalable secure file sharing on untrusted storage,â€ in Proc. Conf. File Storage Technol., 2003, pp. 29â€“42.
 A. Harrinton and C. Jensen. Cryptographic access control in a distributed file system. In Proceedings of ACM SACMAT, 2003.
 L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, â€œMediated ciphertext-policy attribute-based encryption and its application,â€ in Proc. WISA, 2009, LNCS 5932, pp. 309â€“323.
 A. Lewko and B. Waters, â€œDecentralizing attributebased encryption,â€ Cryptology ePrint Archive: Rep. 2010/351, 2010.
 A. Sahai and B. Waters, â€œFuzzy identity-based encryption,â€ in Proc. Eurocrypt, 2005, pp. 457â€“473.
 V. Goyal, O. Pandey, A. Sahai, and B. Waters, â€œAttribute-based encryption for fine-grained access control of encrypted data,â€ in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89â€“98.
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.