Secure Military Communication Using Ciphertext Policy Attribute Based Encryption for Decentralized DTN

被引:0
作者
Ramya, R. [1 ]
Sivaraman, P. [2 ]
Velmurugan, G. [3 ]
机构
[1] AVC Coll Engn, Dept Comp Sci & Engn, Mayladuthurai, Tamil Nadu, India
[2] OAS Inst Technol & Managment, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
[3] Prist Univ, Mtech 2, Kumbakonam, Tamil Nadu, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2016年 / 16卷 / 04期
关键词
Access control; attribute-based encryption (ABE); disruption-tolerant network (DTN); multiauthority; secure data retrieval;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Disruption-tolerant network (DTN) innovations are getting to be fruitful results that permit remote device conveyed by officers to speak with one another and access the confidential data or secret data or summon dependably by abusing outside capacity nodes or storage nodes. Thus a new methodology is introduced to provide successful communication between each other as well as access the confidential information provided by some major authorities like commander or other superiors. The methodology is called Disruption-Tolerant Network (DTN). This system provides efficient scenario for authorization policies and the policies update for secure data retrieval in most challenging cases. The most promising cryptographic solution is introduced to control the access issues called Cipher text Policy Attribute Based Encryption (CP-ABE). Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext -policy attribute-based encryption (CP-ABE) is a guaranteeing cryptographic answer for the right to gain entrance control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently.. We demonstrate how to apply the proposed mechanism to safely and proficiently deal with the classified information dispersed in the Interruption or disruption tolerant network.
引用
收藏
页码:84 / 89
页数:6
相关论文
共 20 条
[1]  
Bethencourt J., 2007, P IEEE S SEC PRIV
[2]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[3]   MaxProp: Routing for vehicle-based disruption-tolerant networks [J].
Burgess, John ;
Gallagher, Brian ;
Jensen, David ;
Levine, Brian Neil .
25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, :1688-1698
[4]  
Chen N., 2010, P AD HOC NETW WORKSH, P1, DOI DOI 10.1109/MEDHOCNET.2010.5546877
[5]  
Chuah M., 2007, P IEEE MILITARY COMM, P1, DOI 10.1109/MOBIQ.2007.4451068
[6]  
Chuah M., 2006, P IEEE MILCOM, P1
[7]  
Goyal V., 2006, P ACM C COMP COMM SE
[8]   ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks [J].
Huang, Dijiang ;
Verma, Mayank .
AD HOC NETWORKS, 2009, 7 (08) :1526-1535
[9]  
Ibraimi L, 2009, LECT NOTES COMPUT SC, V5932, P309, DOI 10.1007/978-3-642-10838-9_23
[10]  
Kallahalla M, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 2ND USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES (FAST'03), P29