ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 6)

Publication Date:

Authors : ; ;

Page : 2165-2166

Keywords : Access control; Attribute based encryption; Multiauthority; Secure Data Retrieval; Networks;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The wireless medium in the military networks are not able to transfer the confidential data between the commander and the soldiers. The commander sends the information to the storage node after encrypting with the help of private keys provided by the key authorities. The soldiers retrieve the information from the storage node by providing their details to the multiple key authorities they provide a private key which helps them to decrypt the information from the storage node. CP-ABE scheme is used for retrieving and securing their data. For data encryption and decryption scalability is provided by ABE. But the problem is that key authorities cannot be fully trusted because they can also access the data from the storage node with the private keys provided by them. In this paper, it is demonstrated how to apply the proposed scheme in Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data.

Last modified: 2021-07-01 14:39:08