SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION TOLERANT MILITARY NETWORKS
SHUBHAM P. VERMA , MAMTA S. MAHAJAN, KALYANI M. ZAWAR and TIPUSULTAN S. TADAVI, ,
A battlefield or a hostile region are partitions in military environments . Intermittent network connectivity is major problem in such environment. Frequent partitions are there. A true and easy solution is Disruption-tolerant network DTN technologies. To interact with each other people in a military environment carries devices that are wireless. The confidential information is accessed by these devices and they command reliably by exploiting external storage nodes. DTN is very successful technology in these networking environments. When there is no wired connection between a source and a destination device, the information from the source node may need to wait in the middle nodes for a huge amount of time until the connection would be correctly established. ABE is one of the challenging approaches which is attribute-based encryption that satisfies the requirements for retrieving secure data in DTNs. An appropriate way of encryption of data is given by Cipher text Policy ABE (CP-ABE) .Decryption should possess an attribute set which was used during encryption in order to decrypt the cipher text. Hence, multiple users may be allowed to decrypt different parts of data according to the security policy.
SHUBHAM P. VERMA et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 5, May-2016, pp. 237-240
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.