Secure and Efficient Data Sharing for Decentralized DTN
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Secure and Efficient Data Sharing for Decentralized DTN

Gauri N. Salodkar, Komal B. Bijwe

Nowadays, there have been increasing demands and concerns for distributed data security, One of the most challenging issues in data sharing systems is the enforcement of access policies and the support of policies updates. Cipher text policy attribute-based encryption (CP-ABE) is becoming a promising cryptographic solution to this issue. It enables data owners to define their own access policies over user attributes and enforce the policies on the data to be distributed. Cipher text -policy attribute-based encryption (CP-ABE) is a guaranteeing cryptographic answer for the right to gain entrance control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. Thus a new methodology is introduced to provide successful communication between each other as well as access the confidential information provided by some major authorities like commander or other superiors. The methodology is called Disruption-Tolerant Network (DTN). This system provides efficient scenario for authorization policies and the policies update for secure data retrieval in most challenging cases. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network also we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently.

Keywords: Military Networks, Encryption, Decryption, DTN, CP-ABE

Edition: Volume 4 Issue 4, April 2015

Pages: 1912 - 1915

Share this Article

How to Cite this Article?

Gauri N. Salodkar, Komal B. Bijwe, "Secure and Efficient Data Sharing for Decentralized DTN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153475, Volume 4 Issue 4, April 2015, 1912 - 1915

134 PDF Views | 109 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Military Networks'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2165 - 2166

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph

Share this Article

| Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1912 - 1915

Secure and Efficient Data Sharing for Decentralized DTN

Gauri N. Salodkar, Komal B. Bijwe

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this Article

| Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 253 - 257

Random Direction Based Model for Intrinsic Secrecy in Wireless Sensor Network

Ramesh L, Dr. A. Marimuthu

Share this Article

Similar Articles with Keyword 'Encryption'

| Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

| Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

| Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

| Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Similar Articles with Keyword 'Decryption'

| Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

| Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

| Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

| Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

| Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Similar Articles with Keyword 'DTN'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2725 - 2726

A Survey of Location Based Services Caching for Efficient Data Access in DTN

Trupti Gedam, Archana D. Shinde

Share this Article

| Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1658 - 1661

Delay Tolerant Networks for Intermittently Connected Mobile Networks

M. Srikanth, A. Obulesh

Share this Article

| Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 979 - 982

Delay-Tolerant Bulk Information Transfers on the Web

A. Amarnath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1107 - 1110

Delivery Delay and Distribution in DTN using Probabilistic Routing of Packets

Heena Arora, Gagandeep Singh, Sahil

Share this Article

| Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1912 - 1915

Secure and Efficient Data Sharing for Decentralized DTN

Gauri N. Salodkar, Komal B. Bijwe

Share this Article

Similar Articles with Keyword 'CP-ABE'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 639 - 642

A Review On Cloud Storage Architectures

Pallavi D. Dudhe, P. L. Ramteke

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2165 - 2166

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph

Share this Article

| Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1912 - 1915

Secure and Efficient Data Sharing for Decentralized DTN

Gauri N. Salodkar, Komal B. Bijwe

Share this Article
Top