Privacy Preserving of Data Retrieval for Decentralized Disruption-Tolerant Military Networks
K Naga Brahma Chari, Dr G Rama swamy, , ,
Affiliations M.Tech (CSE), Priyadarshini Institute of Technology & ScienceProfessor (Dept.of CSE), Priyadarshini Institute of Technology & Science
:NOT ASSIGNED
Abstract
Disruption-tolerant network advancements are becoming to be a productive provision that enable remote device passed on by officers to articulate with one another and access the classified information or secret information by
abusing outside storage nodes. This framework provides the effective state of associations to approval methods and
therefore the solutions overhaul for secure information recovery in most troublesome cases. The foremost encouraging
scientific discipline solutions are at home with management the access problems known as Cipher text-Policy AttributeBased encoding (CP-ABE). Indisputably the foremost troublesome problems during this state are the requirement of endorsement arrangements and therefore the methodologies design for secure information recovery. Then again, the problem of applying CP-ABE in suburbanized DTNs presents a handful of securities and insurance challenges on the property
denial, key escrow, and coordination of characteristics issued from explicit forces. During this paper, we have a tendency
to propose a protected information recovery arrangement mistreatment CP-ABE for suburbanized DTNs wherever varied
key forces manage their properties freely. We have a tendency to show the way to apply the projected half to firmly and
proficiently touch upon the delineate information speckled within the information scattered within the Interference or disruption tolerant network.
Citation
K Naga Brahma Chari,Dr G Rama swamy."Privacy Preserving of Data Retrieval for Decentralized Disruption-Tolerant Military Networks". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 12,pp.1203-1206, December - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1271.pdf,
[1] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and
W. Jonker, ―Mediated ciphertext-policy attributebased encryption and its application,‖ in Proc. WISA,
2009, LNCS 5932, pp. 309–323.
[2] A. Lewko and B. Waters, ―Decentralizing attributebased encryption,‖ Cryptology ePrint Archive: Rep.
2010/351, 2010.
[3] A. Sahai and B. Waters, ―Fuzzy identity-based
encryption,‖ in Proc. Eurocrypt, 2005, pp. 457–473.
[4] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
―Attribute-based encryption for fine-grained access
control of encrypted data,‖ in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
[5] S. Roy and M. Chuah, ―Secure data retrieval based
on ciphertext policy attribute-based encryption (CPAttribute-Based Encryption) system for the Disruption-Tolerant Network’s,‖ Lehigh CSE Tech. Rep.,
2009.
[6] M. Chuah and P. Yang, ―Performance evaluation
of content-based information retrieval schemes for
DTNs,‖ in Proc. IEEE MILCOM, 2007, pp. 1–7.
[7] M. Kallahalla, E. Riedel, R. Swaminathan, Q.
Wang, and K. Fu, ―Plutus: Scalable secure file sharing
on untrusted storage,‖ in Proc. Conf. File Storage
Technol., 2003, pp. 29–42.
[8] A. Harrinton and C. Jensen. Cryptographic access
control in a distributed file system. In Proceedings of
ACM SACMAT, 2003.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.