International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Views: 179

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015


Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.


Abstract: To undergo from continual partitions and infrequent network connectivity, the military environments mobile nodes are likely. The wireless devices carried by soldiers Disruption-tolerant network (DTN) technologies and to allow that wireless drivers, which are now find successful solutions for communication to each other and access the confidential information or command dependently by applying external storage nodes. for retrieval of data securely and the update the policies, in this scenario Some of the most challenging issues are the authorization policies enforcement. A Cipher text-policy which is attribute-based encryption (CP-ABE) is the bright solution for the accessing the control issue. However, there introduced the many privacy and security challenges by the problem of applying CP-ABE Approach in decentralized DTNs with attention to the revocation of attribute, escrow of key, and attributes coordination taken from different authorities. In this paper, using CP-ABE we are going to propose a scheme which retrieves the data securely for decentralized DTNs where their attributes are independently managed by the multiple key authorities. In the disruption-tolerant military network for managing the confidential distributed data securely and efficiently, we determine how to apply the mechanism of proposed system.


Keywords: Access control, Attribute-based Encryption ABE, Multi-authority, Disruption-Tolerant Network DTN, Secure Data Retrieval


Edition: Volume 4 Issue 9, September 2015,


Pages: 1590 - 1593


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top