Downloads: 107 | Views: 124
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016
Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data
Princy.B | Nishley Elizabeth Joseph
Abstract: The wireless medium in the military networks are not able to transfer the confidential data between the commander and the soldiers. The commander sends the information to the storage node after encrypting with the help of private keys provided by the key authorities. The soldiers retrieve the information from the storage node by providing their details to the multiple key authorities they provide a private key which helps them to decrypt the information from the storage node. CP-ABE scheme is used for retrieving and securing their data. For data encryption and decryption scalability is provided by ABE. But the problem is that key authorities cannot be fully trusted because they can also access the data from the storage node with the private keys provided by them. In this paper, it is demonstrated how to apply the proposed scheme in Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data.
Keywords: Access control, Attribute based encryption, Multiauthority, Secure Data Retrieval, Networks
Edition: Volume 5 Issue 6, June 2016,
Pages: 2165 - 2166
Similar Articles with Keyword 'Access control'
Downloads: 68
Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021
Pages: 61 - 70Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution
Bopatriciat Boluma Mangata | Eugene Mbuyi Mukendi | Jean-Didier Batubenga
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant | Hingoliwala H. A.