ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 9)

Publication Date:

Authors : ;

Page : 1590-1593

Keywords : Access control; Attribute-based Encryption ABE; Multi-authority; Disruption-Tolerant Network DTN; Secure Data Retrieval;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

To undergo from continual partitions and infrequent network connectivity, the military environments mobile nodes are likely. The wireless devices carried by soldiers Disruption-tolerant network (DTN) technologies and to allow that wireless drivers, which are now find successful solutions for communication to each other and access the confidential information or command dependently by applying external storage nodes. for retrieval of data securely and the update the policies, in this scenario Some of the most challenging issues are the authorization policies enforcement. A Cipher text-policy which is attribute-based encryption (CP-ABE) is the bright solution for the accessing the control issue. However, there introduced the many privacy and security challenges by the problem of applying CP-ABE Approach in decentralized DTNs with attention to the revocation of attribute, escrow of key, and attributes coordination taken from different authorities. In this paper, using CP-ABE we are going to propose a scheme which retrieves the data securely for decentralized DTNs where their attributes are independently managed by the multiple key authorities. In the disruption-tolerant military network for managing the confidential distributed data securely and efficiently, we determine how to apply the mechanism of proposed system.

Last modified: 2021-06-30 21:53:24