Open Access Open Access  Restricted Access Subscription or Fee Access

Data Rescue Process in Network Medium with Higher End Security Measures

D. Shanmathy

Abstract


In the large number of outgrowing commercial environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the regular medium. In armed surroundings such as an arena or an inhospitable region are likely to experience from irregular network connectivity and recurrent partitions. A new methodology is introduced to provide successful communication between each other as well as access the confidential information provided by some major authorities like commander or other superiors. The methodology is called Disruption-Tolerant Network (DTN). This system provides efficient scenario for authorization procedures and the documents renew for secure data recovery in most challenging cases. The most proficient cryptographic solution is introduced to control the access issues called Cipher text Policy Attribute Based Encryption (CP-ABE). On the other hand, the difficulty of affect CP-ABE in decentralized DTNs set up more than a few security and privacy challenge among consider to the attribute revocation, key escrow, and synchronization of attributes concerned from unusual authorities. This system proposes a secure data rescue design with CP-ABE for decentralized DTNs wherever many key authorities control their attributes autonomously as well as reveal how to relate the proposed method to safely and powerfully handle the private data issued in the disruption tolerant military group. The military group is nothing but the collection of nodes like soldiers and commanders are tied together and provide the better results in regular data transmission mechanisms.


Keywords


Attribute-Based Encryption (ABE), Cipher Text Policy Attribute-Based Encryption (CP-ABE), Disruption Tolerant Network (DTN).

Full Text:

PDF

References


D. Naor, M. Naor, and J. Lotspiech, “Revocation and tracing schemes for stateless receivers,” in Proc. CRYPTO, 2001, LNCS 2139, pp.41–62.

M. Chase and S. S. M. Chow, “Improving privacy and security in multiauthority attribute-based encryption,” in Proc. ACM Conf. Comput.Commun. Security, 2009, pp. 121–130.

M. Chase, “Multi-authority attribute based encryption,” in Proc. TCC,2007, LNCS 4329, pp. 515–534.

S. S.M. Chow, “Removing escrow from identity-based encryption,” in Proc. PKC, 2009, LNCS 5443, pp. 256–276.

S. Rafaeli and D. Hutchison, “A survey of key management for secure group communication,” Comput. Surv., vol. 35, no. 3, pp. 309–329, 2003.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp.321–334.

A.Lewko and B.Waters, “Decentralizing attribute-based encryption,”Cryptology ePrint Archive: Rep. 2010/351, 2010.

M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attributebased systems,” in Proc. ACMConf. Comput. Commun. Security, 2006, pp. 99–112.

S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proc. ASIACCS, 2010, pp. 261–270.

L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323.

J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop:Routing for vehicle-based disruption tolerant networks,” in Proc.IEEE INFOCOM, 2006, pp. 1–11.

M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp. 1–6.

M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37–48.

S. Roy and M. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.