More Related Content
Similar to Attribute Based Secure Information Recovery Retrieval System for Decentralized Disruption Tolerant Military Networks (20)
More from IRJET Journal (20)
Attribute Based Secure Information Recovery Retrieval System for Decentralized Disruption Tolerant Military Networks
- 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3498
Attribute Based Secure Information Recovery Retrieval System for
Decentralized Disruption Tolerant Military Networks
1SUNITHA VANAMALA, 2 V UMA RANI, 3MOHD AZIZ UR REHMAN
1Assistant Professor, Department of Information Technology, Kakatiya Institute of Technology and Science,
Warangal, Telangana, India
2Associate Professor of CSE, School of Information Technology, Kukatpally, District Ranga Reddy,
Telangana, India
3M.Tech Student, School of Information Technology, Kukatpally, District Ranga Reddy, Telangana, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— In military environments we tend to are having
measure partitions like a parcel or a hostile region. There is
little doubt in any respect they suffer from intermittent
network property. They are having frequent partitions.
Disruption-tolerant network DTN technologiesareisalsotrue
and easy solutions. DTN could be a Disruption-tolerant
network. It permits devices that are wireless and carried by
peoples during a} very military to act each other. These
devices take the counsel or management reliably byextending
memory module nodes. In these networking environments
DTN is very productive technology. Once there is no wired
affiliation in between provide and destination device,
information from provides node ought to wait among middle
nodes for oversized quantity for your duration till the
affiliation would be properly established. One among the
troublesome approach is also associate ABE. That’s attribute-
based cryptography that fulfills the necessities to induce
secure information extraction through DTNs. Here the
conception is Cipher text Policy ABE (CP-ABE). It provides the
applicable suggests that of cryptography of information. The
cryptography includes the dataset that the secret writing
should possess thus on decode the cipher text. Hence, totally
different form of users is also given to decode complete
different elements of information in line with the security
policy.
Index Terms-- Disruption-TolerantNetwork (DTN),Secure
Information Recovery, Attribute Based Encryption(ABE);
I. INTRODUCTION
Disruption tolerant Network progress onward getting to be
effective measures that permit hubs to converse with each
other in these great systems administration situations
Commonly, when there is no limit to-end association
between a sources also, a destinationcombine,themessages
from the source hub might need to sit tight in the halfway
hubs for a generous sum of time until the association would
be in the long run set up. Roy and Chuah presented capacity
hubs in DTNs where information is put away or repeated
such that just approved portable hubs can get to the
important data rapidly and productively.Numerousmilitary
applications require expanded assurance of con identical
information including access control techniques that are
cryptographically upheld. By and large, it is alluring to give
separated access administrations such that information
access arrangements are de fined over client properties or
parts, which are overseen by the keypowers.Forinstance, in
a disturbance tolerantmilitarysystem,anadministrator may
store a con identical data at a capacity hub, which ought to
be gotten to by individuals from "Regiment 1" who is taking
part in "Area 2." For this situation, it is a sensible
presumption that various key powers are liable to deal with
their own element characteristics for troopers in their
conveyed districts orechelons,whichcouldbeoftenchanged
(e.g., the quality speaking to current area of moving
troopers) . We allude to this DTN building design where
different powers issue also, deal with their own quality keys
freely as a decentralized DTN. Notwithstanding, the issue of
applying the ABE to DTNs presents a few security and guard
challenges Since a few clients may change their related
properties eventually (for instance, moving their locale), or
some private keys may be traded off, key renouncement (or
upgrade) for every quality is vital keeping in mind the end
goal to make frameworkssecure.Notwithstanding,thisissue
is much more troublesome, particularly in ABE frameworks,
since every quality is possibly shared by different clients
(from this time forward, we allude to such an accumulation
of clients as a quality gathering). This suggests that
renouncement of any property or any single client in a
property gathering would influence alternate clients in the
gathering.
Figure 1: Network Architecture
- 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3499
The last test is the coordination of properties issued from
distinguishing control. At the point when various control
oversee also, issue credit keys to clients freely with their
own expert insider facts, it is difficult to de fine-grained
access approaches over properties issued from
distinguishing controls.Forinstance,assumethattraits"part
1" and "locale 1" are oversee by the power an, and "part 2"
and "area 2" are oversee by the power B. At that point, it is
difficult to produce an access approach (("part 1" OR "part
2") AND ("locale 1" or "district 2")) in the past plans on the
grounds that the OR rationale between properties issued
from diverse powers can't be actualized. This is because of
the way that the unique controls create their own quality
keys utilizing their own autonomouswhat'smore,individual
expert mystery keys. Thusly, general access strategies, for
example, “m- out-of-n" rationale, can't be communicated in
the past plans, which is an extremely useful and usually
required access strategy rationale.
II. RELATED WORK
The scheme of ABE stands forAttributebased encryption isa
promise methodology that satisfies the prerequisites for
secure information recovery in DTNs. Attribute based
encryption highlights a component that empowers an
entrance control overscrambledinformationutilizingaccess
strategies and credited properties among private keys and
cipher texts. Particularly, cipher text-policy ABE (CP-ABE)
gives a versatile method for scrambling information such
that the encrypted characterizes the property set that the
decrypt needs to have with a specific end goal tounscramble
the cipher text. Consequently, diverse clients are permitted
to unscramble distinctive bitsofinformationperthesecurity
strategy. The issue of applying the Attribute based
encryption to DTNs presents a few security and guard
challenges. Since a few clients may change their related
qualities sooner or later (for instance, moving their locale),
or some private keys may be bargained, key disavowal (or
overhaul) for every property is importantwitha specificend
goal to make frameworks secure. However, this issue is
significantly more troublesome, particularly in Attribute
based encryption frameworks, since every characteristic is
possibly shared by numerous clients (from this time
forward, we allude to such an accumulation of clients as a
trait bunch). Another test is the key escrow issue. In CP-
Attribute based encryption; the key power producesprivate
keys of clients by applying the power's expert mystery keys
to clients' related arrangement of traits. The last test is the
coordination of properties issued from diverse powers. At
the point when numerous powers oversee and issue credits
keys to clients freely with their own expert insider facts, it is
difficult to characterize fine-grained access arrangements
over qualities issued from distinctive.
III. FRAME WORK
In this paper, we propose a quality basedsecureinformation
recovery plan utilizing CP-ABE for decentralized DTNs. The
proposed plan highlights the associated accomplishments.
To begin with, quick quality denial improves in
reverse/forward mystery of private information by
lessening the windows ofweakness.Second,encryptions can
characterize a fine-grained access strategy utilizing any
flatness access structure under properties issued from any
picked set of powers. Third, the key escrow concern is
determined by a sans escrow key issuing convention that
endeavors the normal for the decentralized DTN
construction modeling. The key issuing convention creates
and issues client mystery keys by performing a safe two-
party calculation (2PC) conference among the key powers
with their own expert insider facts. The 2PC convention
deflects the key powers from getting any expert obscurity
data of one another such that none of them could produce
the entire arrangement of client keys alone. Subsequently,
clients are not required to completely believe the
commanding voices care in mind the end goal tosecuretheir
information to be shared. The information classificationand
protection can be cryptographically authorized against any
inquisitive key powersorinformationstockpilinghubsin the
proposed plan.
Data privacy: Unauthorized clients who don't have enough
endorsement fulfilling the entrance approach ought to be
discouraged from getting to the plain information in the
capacity hub. What's more, unapproved access from the
capacity hub or key powers ought to be additionally
anticipated.
Collusion-resistance:Ifnumerousclientsscheme,theymay
have the capacity to unscramble a cipher text by combine
their characteristics regardless of the possibilitythat eachof
the clients can't decode the cipher text single-handedly.
Backward and forward Secrecy: In the connection of ABE,
in reverse obscurity involve that any client who comes to
hold a characteristic (that fulfills the entrance strategy)
ought to be kept from getting to the plaintext of the times of
yore information traded before he holds the property. Then
again, forward obscurity implies that any client who drops a
characteristic must to be kept from gettingtotheplaintext of
the ensuing information traded after he drops the trait,
unless the other extensive belongings that he is holding
fulfill the entrance string.
- 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3500
Figure 2: Proposed System Architecture
IV. EXPERIMENTAL RESULTS
In our experiments, admin login into the system after login
into the system to define the access policy here we are going
to create Attributes like Battalion 1, Region 1 and Battalion
1, Region 2 and Battalion 1, Region 3, click on Define access
policy to each one in the same way to Defineaccesspolicyfor
all the Battalions after that keys will be generate for each set
of attributes after that assign the policies for all the soldiers
in that soldier ID will be taken automatically and we need to
give some policy for the selected soldier after that select the
updated message in that to send some message to particular
battalion like updating the message ‘hello world’ and giving
the accessibility for battalion 1 & region 1 after that
Updating a message ‘hello’ for battalion 1 & region 2 and
same way to Updating a message ‘world for battalion 1 &
region 3 after updating the messages the storage node will
store all the updated messages.Toclick onsimulationscreen
the message which you updated in the update message step
message for the soldier-1, 2 or 3 will be displayedherewhen
the particular soldier comes nearer to storage node after
that to click on revoke keys means We already assigned
some soldiers to the specific battalions®ions;inthisstep
we can move them from one region to another Moving
soldier 3 from battalion 1 region 3 to battalion 2 regions1
Here we moved node 3 from one region to another, so we do
not have any key for this node. So whenever the node comes
nearer to storage node it cannot access its data to shown in
below screens
Through our implementation wecandefinetheaccesspolicy
for each attributes and also generate the keys and assign the
region for each solders after that update the message and
keys solders also move to one region to another region the
message can be store in storage node based on that we can
send the data in efficient and secure manner at lower cost
then compare to current protocols.
V. CONCLUSION
Disruption-Tolerant Network enhancement is getting to be
rewarding measures in military applications that authorize
inaccessible device to communicate with one another and
access the con identical data dependablybymisusingoutside
capacity hubs. Cipher text-policy ABE is a versatile
cryptographic answer for the entrance control and secures
information recovery issues. In this paper, we proposed a
expert and secure in sequence improvement approach
operate Cipher text-policyABEfordecentralizedDisruption-
Tolerant Networkswherevariouskeypowersdeal withtheir
qualities autonomously. The innate key escrow issue is
determined such that the confidentiality of the put away
information is ensured even under the threatening
environment where key powers may be traded off or not
completely trusted. What's more, the fine-grained key
disavowal should be possible for every traitbunch.Weshow
- 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3501
how to apply the proposed system to safely and effectively
deal with the con identical information circulated in the
disturbance tolerant military system.Thefuturecanextends
user validation for set of attribute in authenticationofmulti-
authority network environment. Wecanhidetheattributein
access control policy of a user. Different users areallowed to
decrypt unrelated parts of data per the security policy. And
discuss how to construct a ciphertext-policyattribute-based
encryption scheme which would have both: the flexible
delegation and attribute revocation properties, without
involving a Mediator in the system Architecture.
REFERENCES
[1] M. Chuah and P. Yang, “Node density-based adaptive
routing scheme for disruption tolerant networks,” in
Proc. IEEE MILCOM, 2006, pp.1–6.
[2] M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry
route design for sparse ad hoc networks with mobile
nodes,” in Pro 2006, pp. 37–48.
[3] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W.
Jonker, “Mediated cipher-text-policy attribute-based
encryption and its application,” in Proc. WISA, 2009,
LNCS 5932, pp. 309–323.
[4] N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure,
selective group broadcast in vehicular networks using
dynamic attribute based encryption,” in Proc. Ad Hoc
Netw. Workshop, 2010, pp. 1–8.
[5] D. Huang and M. Verma, “ASPE: Attribute-based secure
policy enforcement in vehicular ad hoc networks,” Ad
Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009.
[6] A. Lewko and B. Waters, “Decentralizingattribute-based
encryption,” Cryptology ePrint Archive: Rep.2010/351,
2010.
[7] A. Sahai and B. Waters, “Fuzzy identity-based
encryption,” in Proc. Eurocrypt, 2005, pp. 457–473.
[8] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-
based encryption for fine-grained access control of
encrypted data,” in Proc ACM Conf. Comput. Commun.
Security, 2006, pp. 89–98.
[9] J. Bethencourt, A. Sahai, and B. Waters, “Cipher-text-
policy attribute base encryption,” in Proc. IEEE Security
Privacy, 2007, pp 321–334.
[10] R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based
encryption with non-monotonic access structures,” in
Proc. Security, 2007, pp. 195–203.
[11] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data
sharing with attribute revocation,” in Proc. ASIACCS,
2010, pp. 261–270.
[12] A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based
encryption with efficient revocation,” in Proc. ACM Conf.
Security, 2008, pp. 417–426.
[13] S. Roy andM. Chuah, “Secure data retrieval based on
cipher-text policy attribute-based encryption (CP-ABE)
system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
[14] M. Chuah and P. Yang, “Performance evaluation of
content-based information retrieval schemesforDTNs,”
in Proc. IEEE MILCOM, 2007, pp. 1–7.
[15] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang,and K.
Fu, “Plutus: Scalable secure file sharing on untrusted
storage,” in Proc. Conf. File Storage Technol., 2003, pp.
29–42.
[16] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine,
“Maxprop: Routing forvehicle-baseddisruptiontolerant
networks,” in Proc. IEEE INFOCOM, 2006, pp. 1–11.