International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 131

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 3, March 2017


High Secured Attribute Encryption Based System for Military Data Retrieval

Snehal Gaikwad, Suhas Patil


Abstract: Portable hubs in military situations, for example, a combat zone or an antagonistic locale are prone to experience the ill effects of discontinuous system network and visit parcels. Interruption tolerant system (DTN) advancements are getting to be useful arrangements that permit remote devices conveyed by fighters to correspond with one another and access the classified data or summon dependably by abusing outside capacity hubs. The absolute most difficult issues in this situation are the requirement of authority arrangements and the strategies upgrade for secure information recovery. Ciphertext-arrangement characteristic based encryption (CP-ABE) is a promising cryptographic answer for the entrance control issues. The issue of applying CP-ABE in decentralized DTNs presents a few security and protection challenges with respect to the characteristic denial, key escrow, and coordination of traits issued from various powers. This work introduce a secure information recovery plan utilizing CP-ABE for decentralized DTNs where number of key powers deal with their properties autonomously. This shows how to apply the proposed system to safely and effectively deal with the private information appropriated in the interruption tolerant military system.


Keywords: Certificate authority CA, attribute-based encryption ABE, disruption-tolerant network DTN, multiauthority, secure data retrieval


Edition: Volume 6 Issue 3, March 2017,


Pages: 107 - 109


How to Cite this Article?

Snehal Gaikwad, Suhas Patil, "High Secured Attribute Encryption Based System for Military Data Retrieval", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20171096, Volume 6 Issue 3, March 2017, 107 - 109

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'multiauthority'

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2165 - 2166

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph

Share this Article

Downloads: 122

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 382 - 385

Mechanism for Secure Fault Tolerant Data Access in Disruption-Tolerant Networks

Subhashini P, Ashwin Kumar M

Share this Article

Similar Articles with Keyword 'secure data retrieval'

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2165 - 2166

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph

Share this Article

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1912 - 1915

Secure and Efficient Data Sharing for Decentralized DTN

Gauri N. Salodkar, Komal B. Bijwe

Share this Article

Similar Articles with Keyword 'Certificate'

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, Nigeria, Volume 7 Issue 8, August 2018

Pages: 1671 - 1677

Using Web Service for Generating Permanent Voter Cards (PVCs) for Nigerian Citizens

Anichebe Gregory Emeka

Share this Article

Similar Articles with Keyword 'authority'

Downloads: 93

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 85 - 88

CBCD Methods in Video Copy Detection

Jan Mary Thomas

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'CA'

Downloads: 175 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 136 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 115 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'ABE'

Downloads: 71

Research Paper, Computer Science & Engineering, Sweden, Volume 9 Issue 12, December 2020

Pages: 1137 - 1139

Predicting Diabetes using Gradient Boosting is a Machine Learning Technique

Ali Adam Mohammad

Share this Article

Downloads: 94

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Similar Articles with Keyword 'network'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'DTN'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1658 - 1661

Delay Tolerant Networks for Intermittently Connected Mobile Networks

M. Srikanth, A. Obulesh

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2725 - 2726

A Survey of Location Based Services Caching for Efficient Data Access in DTN

Trupti Gedam, Archana D. Shinde

Share this Article
Top