Survey Paper on Attribute Based Encryption in Disruption Tolerant Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 140 | Weekly Hits: ⮙6 | Monthly Hits: ⮙15

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016

Survey Paper on Attribute Based Encryption in Disruption Tolerant Network

Vishwajeet Mete, Deepali Gothawal

Mobile nodes connecting one node to another node faces some networking connectivity problem in common environment. In military network i.e in battle field are not supposed to suffer network connectivity problem. Disruption tolerant network (DTN) technologies are the solution for this problem. Attribute based encryption (ABE) gives the secure way for data delivery in Disruption Tolerant Network. The most promising cryptographic solution is introduced to control the access issues called Cipher text Policy Attribute Based Encryption (CP-ABE). The Cipher text-policy Attribute Based Encryption for secure data retrieval in decentralized Disruption Tolerant Networks (DTNs) where multiple key authorities manage their attributes independently. It gives an appropriate way of encryption of data, the encryption includes the attribute set that the decryption needs to possess in order to decrypt the cipher text. Hence, Many users can be allowed to decrypt different parts of data according to the security policy. But concept of applying CP-ABE in DTNs introduces security and privacy problems with regard to Attribute revocation, Key escrow, Coordination of attributes issued from different authorities.

Keywords: Access control, attribute-based encryption ABE, disruption-tolerant network DTN, multi authority, secure data retrieval

Edition: Volume 5 Issue 1, January 2016

Pages: 243 - 246

Share this Article

How to Cite this Article?

Vishwajeet Mete, Deepali Gothawal, "Survey Paper on Attribute Based Encryption in Disruption Tolerant Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152617, Volume 5 Issue 1, January 2016, 243 - 246

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Access control'

Downloads: 66 | Weekly Hits: ⮙2 | Monthly Hits: ⮙35

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Downloads: 103 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1736 - 1740

Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage

Shafi Shaik, M. Geethalatha

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Similar Articles with Keyword 'attribute-based encryption ABE'

Downloads: 116 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this Article

Downloads: 117 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this Article

Downloads: 122 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 980 - 983

Secure Forensic Report Retrieval Application using Cipher Text-Policy Attribute-Based Encryption

Vinod I. Jondhale, Manisha Y. Joshi

Share this Article

Downloads: 130 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 107 - 109

High Secured Attribute Encryption Based System for Military Data Retrieval

Snehal Gaikwad, Suhas Patil

Share this Article

Downloads: 140 | Weekly Hits: ⮙6 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 243 - 246

Survey Paper on Attribute Based Encryption in Disruption Tolerant Network

Vishwajeet Mete, Deepali Gothawal

Share this Article

Similar Articles with Keyword 'disruption-tolerant network DTN'

Downloads: 116 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this Article

Downloads: 117 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this Article

Downloads: 130 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 107 - 109

High Secured Attribute Encryption Based System for Military Data Retrieval

Snehal Gaikwad, Suhas Patil

Share this Article

Downloads: 140 | Weekly Hits: ⮙6 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 243 - 246

Survey Paper on Attribute Based Encryption in Disruption Tolerant Network

Vishwajeet Mete, Deepali Gothawal

Share this Article

Similar Articles with Keyword 'multi authority'

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2128 - 2130

A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique

Rasal Swati A., Pawar B. V.

Share this Article

Downloads: 116 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this Article

Downloads: 129 | Weekly Hits: ⮙2 | Monthly Hits: ⮙6

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 96 - 98

DTN Technologies Used for Secure Data Retrieval in Decentralized Military Networks

Dr. B R Prasad Babu, Kavyashree.G, T. Gayathri

Share this Article

Downloads: 131 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 87 - 90

Updating Policy with Access Control Using Multi Authority in the Cloud

V. Kalpana, J. Daphney Joann

Share this Article

Downloads: 140 | Weekly Hits: ⮙6 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 243 - 246

Survey Paper on Attribute Based Encryption in Disruption Tolerant Network

Vishwajeet Mete, Deepali Gothawal

Share this Article

Similar Articles with Keyword 'secure data retrieval'

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2165 - 2166

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph

Share this Article

Downloads: 111 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1912 - 1915

Secure and Efficient Data Sharing for Decentralized DTN

Gauri N. Salodkar, Komal B. Bijwe

Share this Article

Downloads: 116 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this Article

Downloads: 117 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this Article

Downloads: 129 | Weekly Hits: ⮙2 | Monthly Hits: ⮙6

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 96 - 98

DTN Technologies Used for Secure Data Retrieval in Decentralized Military Networks

Dr. B R Prasad Babu, Kavyashree.G, T. Gayathri

Share this Article



Top