Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 6)Publication Date: 2016-06-05
Authors : Princy.B; Nishley Elizabeth Joseph;
Page : 2165-2166
Keywords : Access control; Attribute based encryption; Multiauthority; Secure Data Retrieval; Networks;
Abstract
The wireless medium in the military networks are not able to transfer the confidential data between the commander and the soldiers. The commander sends the information to the storage node after encrypting with the help of private keys provided by the key authorities. The soldiers retrieve the information from the storage node by providing their details to the multiple key authorities they provide a private key which helps them to decrypt the information from the storage node. CP-ABE scheme is used for retrieving and securing their data. For data encryption and decryption scalability is provided by ABE. But the problem is that key authorities cannot be fully trusted because they can also access the data from the storage node with the private keys provided by them. In this paper, it is demonstrated how to apply the proposed scheme in Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data.
Other Latest Articles
- Detection of Hidden Tunnel Attack in Mobile Ad-Hoc Network
- Real Instant Road Condition Monitoring With Data Logging Algorithm
- Some More Results on k ? Super Mean Graphs
- Studies of Additive Properties of Substituted-dihydropyrimidin-2(1H) One in different Solvent by Refractometrically
- Significance of Silica Fume on the Mechanical Properties of Recycled Aggregate Concrete
Last modified: 2021-07-01 14:39:08