SlideShare a Scribd company logo
1 of 9
Secure Data Retrieval for Decentralized Disruption-Tolerant 
Military Networks 
ABSTRACT: 
Mobile nodes in military environments such as a battlefield or a hostile region are 
likely to suffer from intermittent network connectivity and frequent partitions. 
Disruption-tolerant network (DTN) technologies are becoming successful solutions 
that allow wireless devices carried by soldiers to communicate with each other and 
access the confidential information or command reliably by exploiting external 
storage nodes. Some of the most challenging issues in this scenario are the 
enforcement of authorization policies and the policies update for secure data 
retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising 
cryptographic solution to the access control issues. However, the problem of 
applying CP-ABE in decentralized DTNs introduces several security and privacy 
challenges with regard to the attribute revocation, key escrow, and coordination of 
attributes issued from different authorities. In this paper, we propose a secure data 
retrieval scheme using CP-ABE for decentralized DTNs where multiple key 
authorities manage their attributes independently. We demonstrate how to apply 
the proposed mechanism to securely and efficiently manage the confidential data 
distributed in the disruption-tolerant military network.
EXISTING SYSTEM: 
The concept of attribute-based encryption (ABE) is a promising approach that 
fulfills the requirements for secure data retrieval in DTNs. ABE features a 
mechanism that enables an access control over encrypted data using access policies 
and ascribed attributes among private keys and ciphertexts. Especially, ciphertext-policy 
ABE (CP-ABE) provides a scalable way of encrypting data such that the 
encryptor defines the attribute set that the decryptor needs to possess in order to 
decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces 
of data per the security policy. 
DISADVANTAGES OF EXISTING SYSTEM: 
 The problem of applying the ABE to DTNs introduces several security and 
privacy challenges. Since some users may change their associated attributes 
at some point (for example, moving their region), or some private keys 
might be compromised, key revocation (or update) for each attribute is 
necessary in order to make systems secure.
 However, this issue is even more difficult, especially in ABE systems, since 
each attribute is conceivably shared by multiple users (henceforth, we refer 
to such a collection of users as an attribute group) 
 Another challenge is the key escrow problem. In CP-ABE, the key authority 
generates private keys of users by applying the authority’s master secret 
keys to users’ associated set of attributes. 
 The last challenge is the coordination of attributes issued from different 
authorities. When multiple authorities manage and issue attributes keys to 
users independently with their own master secrets, it is very hard to define 
fine-grained access policies over attributes issued from different authorities. 
PROPOSED SYSTEM: 
In this paper, we propose an attribute-based secure data retrieval scheme using CP-ABE 
for decentralized DTNs. The proposed scheme features the following 
achievements. First, immediate attribute revocation enhances backward/forward 
secrecy of confidential data by reducing the windows of vulnerability. Second, 
encryptors can define a fine-grained access policy using any monotone access 
structure under attributes issued from any chosen set of authorities. Third, the key 
escrow problem is resolved by an escrow-free key issuing protocol that exploits the
characteristic of the decentralized DTN architecture. The key issuing protocol 
generates and issues user secret keys by performing a secure two-party 
computation (2PC) protocol among the key authorities with their own master 
secrets. The 2PC protocol deters the key authorities from obtaining any master 
secret information of each other such that none of them could generate the whole 
set of user keys alone. Thus, users are not required to fully trust the authorities in 
order to protect their data to be shared. The data confidentiality and privacy can be 
cryptographically enforced against any curious key authorities or data storage 
nodes in the proposed scheme. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Data confidentiality: Unauthorized users who do not have enough credentials 
satisfying the access policy should be deterred from accessing the plain data in 
the storage node. In addition, unauthorized access from the storage node or 
key authorities should be also prevented. 
 Collusion-resistance: If multiple users collude, they may be able to decrypt a 
ciphertext by combining their attributes even if each of the users cannot 
decrypt the ciphertext alone. 
 Backward and forward Secrecy: In the context of ABE, backward secrecy 
means that any user who comes to hold an attribute (that satisfies the access
policy) should be prevented from accessing the plaintext of the previous data 
exchanged before he holds the attribute. On the other hand, forward secrecy 
means that any user who drops an attribute should be prevented from 
accessing the plaintext of the subsequent data exchanged after he drops the 
attribute, unless the other valid attributes that he is holding satisfy the access 
policy. 
SYSTEM ARCHITECTURE:
MODULES: 
1. Key Authorities 
2. Storage Nodes 
3. Sender 
4. User 
MODULES DESCRIPTION: 
Key Authorities: 
They are key generation centers that generate public/secret parameters for CP-ABE. 
The key authorities consist of a central authority and multiple local 
authorities. We assume that there are secure and reliable communication channels 
between a central authority and each local authority during the initial key setup and 
generation phase. Each local authority manages different attributes and issues 
corresponding attribute keys to users. They grant differential access rights to 
individual users based on the users’ attributes. The key authorities are assumed to 
be honest-but-curious. That is, they will honestly execute the assigned tasks in the
system; however they would like to learn information of encrypted contents as 
much as possible. 
Storage node: 
This is an entity that stores data from senders and provide corresponding access to 
users. It may be mobile or static. Similar to the previous schemes, we also assume 
the storage node to be semi-trusted that is honest-but-curious. 
Sender: 
This is an entity who owns confidential messages or data (e.g., a commander) and 
wishes to store them into the external data storage node for ease of sharing or for 
reliable delivery to users in the extreme networking environments. A sender is 
responsible for defining (attribute based) access policy and enforcing it on its own 
data by encrypting the data under the policy before storing it to the storage node. 
User: 
This is a mobile node who wants to access the data stored at the storage node (e.g., 
a soldier). If a user possesses a set of attributes satisfying the access policy of the 
encrypted data defined by the sender, and is not revoked in any of the attributes, 
then he will be able to decrypt the ciphertext and obtain the data.
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL
REFERENCE: 
Junbeom Hur and Kyungtae Kang, Member, IEEE, ACM “Secure Data Retrieval 
for Decentralized Disruption-Tolerant Military Networks”-IEEE/ACM 
TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014.

More Related Content

What's hot

Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
 
Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...theijes
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Adz91 Digital Ads Pvt Ltd
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Pvrtechnologies Nellore
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...Nexgen Technology
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...IGEEKS TECHNOLOGIES
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Nexgen Technology
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudAswathy Rajan
 

What's hot (20)

Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
 
Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
J018145862
J018145862J018145862
J018145862
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloud
 

Similar to JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks

2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...IEEEFINALSEMSTUDENTSPROJECTS
 
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...IRJET Journal
 
Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Shakas Technologies
 
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Shakas Technologies
 
Iaetsd a framework for secure data
Iaetsd a framework for secure dataIaetsd a framework for secure data
Iaetsd a framework for secure dataIaetsd Iaetsd
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...IJCERT JOURNAL
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityEditor IJMTER
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsJPINFOTECH JAYAPRAKASH
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsIEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...IEEEGLOBALSOFTTECHNOLOGIES
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsJPINFOTECH JAYAPRAKASH
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...IRJET Journal
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptxkamalakantas
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...IRJET Journal
 

Similar to JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks (20)

2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
 
Ijcatr04051007
Ijcatr04051007Ijcatr04051007
Ijcatr04051007
 
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
 
Paper2
Paper2Paper2
Paper2
 
Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds
 
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
 
Iaetsd a framework for secure data
Iaetsd a framework for secure dataIaetsd a framework for secure data
Iaetsd a framework for secure data
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentiality
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
 

More from chennaijp

JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...chennaijp
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Patternchennaijp
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...chennaijp
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...chennaijp
 
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...chennaijp
 
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...chennaijp
 
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...chennaijp
 
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411   Secure Continuous Aggregation in Wireless Sensor NetworksJPN1411   Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networkschennaijp
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...chennaijp
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...chennaijp
 
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...chennaijp
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...chennaijp
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networkschennaijp
 
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...chennaijp
 
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...chennaijp
 
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...chennaijp
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETschennaijp
 
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1410   Images as Occlusions of Textures: A Framework for SegmentationJPM1410   Images as Occlusions of Textures: A Framework for Segmentation
JPM1410 Images as Occlusions of Textures: A Framework for Segmentationchennaijp
 
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407   Exposing Digital Image Forgeries by Illumination Color ClassificationJPM1407   Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classificationchennaijp
 

More from chennaijp (20)

JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Pattern
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
 
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
 
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
 
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
 
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411   Secure Continuous Aggregation in Wireless Sensor NetworksJPN1411   Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
 
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
 
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
 
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
 
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
 
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1410   Images as Occlusions of Textures: A Framework for SegmentationJPM1410   Images as Occlusions of Textures: A Framework for Segmentation
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
 
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407   Exposing Digital Image Forgeries by Illumination Color ClassificationJPM1407   Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
 

Recently uploaded

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks

  • 1. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks ABSTRACT: Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.
  • 2. EXISTING SYSTEM: The concept of attribute-based encryption (ABE) is a promising approach that fulfills the requirements for secure data retrieval in DTNs. ABE features a mechanism that enables an access control over encrypted data using access policies and ascribed attributes among private keys and ciphertexts. Especially, ciphertext-policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy. DISADVANTAGES OF EXISTING SYSTEM:  The problem of applying the ABE to DTNs introduces several security and privacy challenges. Since some users may change their associated attributes at some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each attribute is necessary in order to make systems secure.
  • 3.  However, this issue is even more difficult, especially in ABE systems, since each attribute is conceivably shared by multiple users (henceforth, we refer to such a collection of users as an attribute group)  Another challenge is the key escrow problem. In CP-ABE, the key authority generates private keys of users by applying the authority’s master secret keys to users’ associated set of attributes.  The last challenge is the coordination of attributes issued from different authorities. When multiple authorities manage and issue attributes keys to users independently with their own master secrets, it is very hard to define fine-grained access policies over attributes issued from different authorities. PROPOSED SYSTEM: In this paper, we propose an attribute-based secure data retrieval scheme using CP-ABE for decentralized DTNs. The proposed scheme features the following achievements. First, immediate attribute revocation enhances backward/forward secrecy of confidential data by reducing the windows of vulnerability. Second, encryptors can define a fine-grained access policy using any monotone access structure under attributes issued from any chosen set of authorities. Third, the key escrow problem is resolved by an escrow-free key issuing protocol that exploits the
  • 4. characteristic of the decentralized DTN architecture. The key issuing protocol generates and issues user secret keys by performing a secure two-party computation (2PC) protocol among the key authorities with their own master secrets. The 2PC protocol deters the key authorities from obtaining any master secret information of each other such that none of them could generate the whole set of user keys alone. Thus, users are not required to fully trust the authorities in order to protect their data to be shared. The data confidentiality and privacy can be cryptographically enforced against any curious key authorities or data storage nodes in the proposed scheme. ADVANTAGES OF PROPOSED SYSTEM:  Data confidentiality: Unauthorized users who do not have enough credentials satisfying the access policy should be deterred from accessing the plain data in the storage node. In addition, unauthorized access from the storage node or key authorities should be also prevented.  Collusion-resistance: If multiple users collude, they may be able to decrypt a ciphertext by combining their attributes even if each of the users cannot decrypt the ciphertext alone.  Backward and forward Secrecy: In the context of ABE, backward secrecy means that any user who comes to hold an attribute (that satisfies the access
  • 5. policy) should be prevented from accessing the plaintext of the previous data exchanged before he holds the attribute. On the other hand, forward secrecy means that any user who drops an attribute should be prevented from accessing the plaintext of the subsequent data exchanged after he drops the attribute, unless the other valid attributes that he is holding satisfy the access policy. SYSTEM ARCHITECTURE:
  • 6. MODULES: 1. Key Authorities 2. Storage Nodes 3. Sender 4. User MODULES DESCRIPTION: Key Authorities: They are key generation centers that generate public/secret parameters for CP-ABE. The key authorities consist of a central authority and multiple local authorities. We assume that there are secure and reliable communication channels between a central authority and each local authority during the initial key setup and generation phase. Each local authority manages different attributes and issues corresponding attribute keys to users. They grant differential access rights to individual users based on the users’ attributes. The key authorities are assumed to be honest-but-curious. That is, they will honestly execute the assigned tasks in the
  • 7. system; however they would like to learn information of encrypted contents as much as possible. Storage node: This is an entity that stores data from senders and provide corresponding access to users. It may be mobile or static. Similar to the previous schemes, we also assume the storage node to be semi-trusted that is honest-but-curious. Sender: This is an entity who owns confidential messages or data (e.g., a commander) and wishes to store them into the external data storage node for ease of sharing or for reliable delivery to users in the extreme networking environments. A sender is responsible for defining (attribute based) access policy and enforcing it on its own data by encrypting the data under the policy before storing it to the storage node. User: This is a mobile node who wants to access the data stored at the storage node (e.g., a soldier). If a user possesses a set of attributes satisfying the access policy of the encrypted data defined by the sender, and is not revoked in any of the attributes, then he will be able to decrypt the ciphertext and obtain the data.
  • 8. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL
  • 9. REFERENCE: Junbeom Hur and Kyungtae Kang, Member, IEEE, ACM “Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks”-IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014.