ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SECURE CIPHER TEXT POLICY FOR MILITARY

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 6)

Publication Date:

Authors : ; ;

Page : 97-101

Keywords : Access control; attribute - based encryption (ABE); disruption - tolerant network (DTN); multiauthority; secure data retrieva;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity. Disruption - tolerant network (DTN) technol ogies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information. Disruption - tolerant network (DTN) technologies are becoming successful solutions that allow nod es to communicate with each other in this extreme networking environment. The concept of attribute - based encryption (ABE) is a promising approach that fulfils the requirements for secure data retrieval in DTNs. Especially, Ciphertext - Policy ABE (CP - ABE) pr ovides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy.

Last modified: 2015-06-16 21:03:29