SECURE CIPHER TEXT POLICY FOR MILITARY
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 6)Publication Date: 2015-06-30
Authors : Shazia Saleem; Raafiya Gulmeher;
Page : 97-101
Keywords : Access control; attribute - based encryption (ABE); disruption - tolerant network (DTN); multiauthority; secure data retrieva;
Abstract
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity. Disruption - tolerant network (DTN) technol ogies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information. Disruption - tolerant network (DTN) technologies are becoming successful solutions that allow nod es to communicate with each other in this extreme networking environment. The concept of attribute - based encryption (ABE) is a promising approach that fulfils the requirements for secure data retrieval in DTNs. Especially, Ciphertext - Policy ABE (CP - ABE) pr ovides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy.
Other Latest Articles
- OFDMA RELAY NETWORKS FOR PERFORMING MULTICAST OPERATIONS
- COMPARATIVE A NALYSIS OF T - BEAM BRIDGE BY RATIONAL METHOD AND STAAD PR O
- O PTIMALLY CONFIGURED ZON E ROUTING PROTOCOL FOR BLENDING VARIOUS NETWORK WITH MOBILE ADHOC NETWORKS
- RELIABILITY ASSESSMENT OF ROOF TOP SOLAR / PV SYSTEM
- RELIABILITY EVALUATION OF WIND POWER PLANT ? A CASE STUDY
Last modified: 2015-06-16 21:03:29