SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3498
Attribute Based Secure Information Recovery Retrieval System for
Decentralized Disruption Tolerant Military Networks
1SUNITHA VANAMALA, 2 V UMA RANI, 3MOHD AZIZ UR REHMAN
1Assistant Professor, Department of Information Technology, Kakatiya Institute of Technology and Science,
Warangal, Telangana, India
2Associate Professor of CSE, School of Information Technology, Kukatpally, District Ranga Reddy,
Telangana, India
3M.Tech Student, School of Information Technology, Kukatpally, District Ranga Reddy, Telangana, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— In military environments we tend to are having
measure partitions like a parcel or a hostile region. There is
little doubt in any respect they suffer from intermittent
network property. They are having frequent partitions.
Disruption-tolerant network DTN technologiesareisalsotrue
and easy solutions. DTN could be a Disruption-tolerant
network. It permits devices that are wireless and carried by
peoples during a} very military to act each other. These
devices take the counsel or management reliably byextending
memory module nodes. In these networking environments
DTN is very productive technology. Once there is no wired
affiliation in between provide and destination device,
information from provides node ought to wait among middle
nodes for oversized quantity for your duration till the
affiliation would be properly established. One among the
troublesome approach is also associate ABE. That’s attribute-
based cryptography that fulfills the necessities to induce
secure information extraction through DTNs. Here the
conception is Cipher text Policy ABE (CP-ABE). It provides the
applicable suggests that of cryptography of information. The
cryptography includes the dataset that the secret writing
should possess thus on decode the cipher text. Hence, totally
different form of users is also given to decode complete
different elements of information in line with the security
policy.
Index Terms-- Disruption-TolerantNetwork (DTN),Secure
Information Recovery, Attribute Based Encryption(ABE);
I. INTRODUCTION
Disruption tolerant Network progress onward getting to be
effective measures that permit hubs to converse with each
other in these great systems administration situations
Commonly, when there is no limit to-end association
between a sources also, a destinationcombine,themessages
from the source hub might need to sit tight in the halfway
hubs for a generous sum of time until the association would
be in the long run set up. Roy and Chuah presented capacity
hubs in DTNs where information is put away or repeated
such that just approved portable hubs can get to the
important data rapidly and productively.Numerousmilitary
applications require expanded assurance of con identical
information including access control techniques that are
cryptographically upheld. By and large, it is alluring to give
separated access administrations such that information
access arrangements are de fined over client properties or
parts, which are overseen by the keypowers.Forinstance, in
a disturbance tolerantmilitarysystem,anadministrator may
store a con identical data at a capacity hub, which ought to
be gotten to by individuals from "Regiment 1" who is taking
part in "Area 2." For this situation, it is a sensible
presumption that various key powers are liable to deal with
their own element characteristics for troopers in their
conveyed districts orechelons,whichcouldbeoftenchanged
(e.g., the quality speaking to current area of moving
troopers) . We allude to this DTN building design where
different powers issue also, deal with their own quality keys
freely as a decentralized DTN. Notwithstanding, the issue of
applying the ABE to DTNs presents a few security and guard
challenges Since a few clients may change their related
properties eventually (for instance, moving their locale), or
some private keys may be traded off, key renouncement (or
upgrade) for every quality is vital keeping in mind the end
goal to make frameworkssecure.Notwithstanding,thisissue
is much more troublesome, particularly in ABE frameworks,
since every quality is possibly shared by different clients
(from this time forward, we allude to such an accumulation
of clients as a quality gathering). This suggests that
renouncement of any property or any single client in a
property gathering would influence alternate clients in the
gathering.
Figure 1: Network Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3499
The last test is the coordination of properties issued from
distinguishing control. At the point when various control
oversee also, issue credit keys to clients freely with their
own expert insider facts, it is difficult to de fine-grained
access approaches over properties issued from
distinguishing controls.Forinstance,assumethattraits"part
1" and "locale 1" are oversee by the power an, and "part 2"
and "area 2" are oversee by the power B. At that point, it is
difficult to produce an access approach (("part 1" OR "part
2") AND ("locale 1" or "district 2")) in the past plans on the
grounds that the OR rationale between properties issued
from diverse powers can't be actualized. This is because of
the way that the unique controls create their own quality
keys utilizing their own autonomouswhat'smore,individual
expert mystery keys. Thusly, general access strategies, for
example, “m- out-of-n" rationale, can't be communicated in
the past plans, which is an extremely useful and usually
required access strategy rationale.
II. RELATED WORK
The scheme of ABE stands forAttributebased encryption isa
promise methodology that satisfies the prerequisites for
secure information recovery in DTNs. Attribute based
encryption highlights a component that empowers an
entrance control overscrambledinformationutilizingaccess
strategies and credited properties among private keys and
cipher texts. Particularly, cipher text-policy ABE (CP-ABE)
gives a versatile method for scrambling information such
that the encrypted characterizes the property set that the
decrypt needs to have with a specific end goal tounscramble
the cipher text. Consequently, diverse clients are permitted
to unscramble distinctive bitsofinformationperthesecurity
strategy. The issue of applying the Attribute based
encryption to DTNs presents a few security and guard
challenges. Since a few clients may change their related
qualities sooner or later (for instance, moving their locale),
or some private keys may be bargained, key disavowal (or
overhaul) for every property is importantwitha specificend
goal to make frameworks secure. However, this issue is
significantly more troublesome, particularly in Attribute
based encryption frameworks, since every characteristic is
possibly shared by numerous clients (from this time
forward, we allude to such an accumulation of clients as a
trait bunch). Another test is the key escrow issue. In CP-
Attribute based encryption; the key power producesprivate
keys of clients by applying the power's expert mystery keys
to clients' related arrangement of traits. The last test is the
coordination of properties issued from diverse powers. At
the point when numerous powers oversee and issue credits
keys to clients freely with their own expert insider facts, it is
difficult to characterize fine-grained access arrangements
over qualities issued from distinctive.
III. FRAME WORK
In this paper, we propose a quality basedsecureinformation
recovery plan utilizing CP-ABE for decentralized DTNs. The
proposed plan highlights the associated accomplishments.
To begin with, quick quality denial improves in
reverse/forward mystery of private information by
lessening the windows ofweakness.Second,encryptions can
characterize a fine-grained access strategy utilizing any
flatness access structure under properties issued from any
picked set of powers. Third, the key escrow concern is
determined by a sans escrow key issuing convention that
endeavors the normal for the decentralized DTN
construction modeling. The key issuing convention creates
and issues client mystery keys by performing a safe two-
party calculation (2PC) conference among the key powers
with their own expert insider facts. The 2PC convention
deflects the key powers from getting any expert obscurity
data of one another such that none of them could produce
the entire arrangement of client keys alone. Subsequently,
clients are not required to completely believe the
commanding voices care in mind the end goal tosecuretheir
information to be shared. The information classificationand
protection can be cryptographically authorized against any
inquisitive key powersorinformationstockpilinghubsin the
proposed plan.
Data privacy: Unauthorized clients who don't have enough
endorsement fulfilling the entrance approach ought to be
discouraged from getting to the plain information in the
capacity hub. What's more, unapproved access from the
capacity hub or key powers ought to be additionally
anticipated.
Collusion-resistance:Ifnumerousclientsscheme,theymay
have the capacity to unscramble a cipher text by combine
their characteristics regardless of the possibilitythat eachof
the clients can't decode the cipher text single-handedly.
Backward and forward Secrecy: In the connection of ABE,
in reverse obscurity involve that any client who comes to
hold a characteristic (that fulfills the entrance strategy)
ought to be kept from getting to the plaintext of the times of
yore information traded before he holds the property. Then
again, forward obscurity implies that any client who drops a
characteristic must to be kept from gettingtotheplaintext of
the ensuing information traded after he drops the trait,
unless the other extensive belongings that he is holding
fulfill the entrance string.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3500
Figure 2: Proposed System Architecture
IV. EXPERIMENTAL RESULTS
In our experiments, admin login into the system after login
into the system to define the access policy here we are going
to create Attributes like Battalion 1, Region 1 and Battalion
1, Region 2 and Battalion 1, Region 3, click on Define access
policy to each one in the same way to Defineaccesspolicyfor
all the Battalions after that keys will be generate for each set
of attributes after that assign the policies for all the soldiers
in that soldier ID will be taken automatically and we need to
give some policy for the selected soldier after that select the
updated message in that to send some message to particular
battalion like updating the message ‘hello world’ and giving
the accessibility for battalion 1 & region 1 after that
Updating a message ‘hello’ for battalion 1 & region 2 and
same way to Updating a message ‘world for battalion 1 &
region 3 after updating the messages the storage node will
store all the updated messages.Toclick onsimulationscreen
the message which you updated in the update message step
message for the soldier-1, 2 or 3 will be displayedherewhen
the particular soldier comes nearer to storage node after
that to click on revoke keys means We already assigned
some soldiers to the specific battalions&regions;inthisstep
we can move them from one region to another Moving
soldier 3 from battalion 1 region 3 to battalion 2 regions1
Here we moved node 3 from one region to another, so we do
not have any key for this node. So whenever the node comes
nearer to storage node it cannot access its data to shown in
below screens
Through our implementation wecandefinetheaccesspolicy
for each attributes and also generate the keys and assign the
region for each solders after that update the message and
keys solders also move to one region to another region the
message can be store in storage node based on that we can
send the data in efficient and secure manner at lower cost
then compare to current protocols.
V. CONCLUSION
Disruption-Tolerant Network enhancement is getting to be
rewarding measures in military applications that authorize
inaccessible device to communicate with one another and
access the con identical data dependablybymisusingoutside
capacity hubs. Cipher text-policy ABE is a versatile
cryptographic answer for the entrance control and secures
information recovery issues. In this paper, we proposed a
expert and secure in sequence improvement approach
operate Cipher text-policyABEfordecentralizedDisruption-
Tolerant Networkswherevariouskeypowersdeal withtheir
qualities autonomously. The innate key escrow issue is
determined such that the confidentiality of the put away
information is ensured even under the threatening
environment where key powers may be traded off or not
completely trusted. What's more, the fine-grained key
disavowal should be possible for every traitbunch.Weshow
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3501
how to apply the proposed system to safely and effectively
deal with the con identical information circulated in the
disturbance tolerant military system.Thefuturecanextends
user validation for set of attribute in authenticationofmulti-
authority network environment. Wecanhidetheattributein
access control policy of a user. Different users areallowed to
decrypt unrelated parts of data per the security policy. And
discuss how to construct a ciphertext-policyattribute-based
encryption scheme which would have both: the flexible
delegation and attribute revocation properties, without
involving a Mediator in the system Architecture.
REFERENCES
[1] M. Chuah and P. Yang, “Node density-based adaptive
routing scheme for disruption tolerant networks,” in
Proc. IEEE MILCOM, 2006, pp.1–6.
[2] M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry
route design for sparse ad hoc networks with mobile
nodes,” in Pro 2006, pp. 37–48.
[3] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W.
Jonker, “Mediated cipher-text-policy attribute-based
encryption and its application,” in Proc. WISA, 2009,
LNCS 5932, pp. 309–323.
[4] N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure,
selective group broadcast in vehicular networks using
dynamic attribute based encryption,” in Proc. Ad Hoc
Netw. Workshop, 2010, pp. 1–8.
[5] D. Huang and M. Verma, “ASPE: Attribute-based secure
policy enforcement in vehicular ad hoc networks,” Ad
Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009.
[6] A. Lewko and B. Waters, “Decentralizingattribute-based
encryption,” Cryptology ePrint Archive: Rep.2010/351,
2010.
[7] A. Sahai and B. Waters, “Fuzzy identity-based
encryption,” in Proc. Eurocrypt, 2005, pp. 457–473.
[8] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-
based encryption for fine-grained access control of
encrypted data,” in Proc ACM Conf. Comput. Commun.
Security, 2006, pp. 89–98.
[9] J. Bethencourt, A. Sahai, and B. Waters, “Cipher-text-
policy attribute base encryption,” in Proc. IEEE Security
Privacy, 2007, pp 321–334.
[10] R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based
encryption with non-monotonic access structures,” in
Proc. Security, 2007, pp. 195–203.
[11] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data
sharing with attribute revocation,” in Proc. ASIACCS,
2010, pp. 261–270.
[12] A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based
encryption with efficient revocation,” in Proc. ACM Conf.
Security, 2008, pp. 417–426.
[13] S. Roy andM. Chuah, “Secure data retrieval based on
cipher-text policy attribute-based encryption (CP-ABE)
system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
[14] M. Chuah and P. Yang, “Performance evaluation of
content-based information retrieval schemesforDTNs,”
in Proc. IEEE MILCOM, 2007, pp. 1–7.
[15] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang,and K.
Fu, “Plutus: Scalable secure file sharing on untrusted
storage,” in Proc. Conf. File Storage Technol., 2003, pp.
29–42.
[16] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine,
“Maxprop: Routing forvehicle-baseddisruptiontolerant
networks,” in Proc. IEEE INFOCOM, 2006, pp. 1–11.

More Related Content

What's hot

Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
1crore projects
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 

What's hot (20)

IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
C04932125
C04932125C04932125
C04932125
 
A Secured Cloud Data Storage with Access Privilages
A Secured Cloud Data Storage with Access PrivilagesA Secured Cloud Data Storage with Access Privilages
A Secured Cloud Data Storage with Access Privilages
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 

Similar to Attribute Based Secure Information Recovery Retrieval System for Decentralized Disruption Tolerant Military Networks

A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 

Similar to Attribute Based Secure Information Recovery Retrieval System for Decentralized Disruption Tolerant Military Networks (20)

IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
 
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
Paper1
Paper1Paper1
Paper1
 
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 

Attribute Based Secure Information Recovery Retrieval System for Decentralized Disruption Tolerant Military Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3498 Attribute Based Secure Information Recovery Retrieval System for Decentralized Disruption Tolerant Military Networks 1SUNITHA VANAMALA, 2 V UMA RANI, 3MOHD AZIZ UR REHMAN 1Assistant Professor, Department of Information Technology, Kakatiya Institute of Technology and Science, Warangal, Telangana, India 2Associate Professor of CSE, School of Information Technology, Kukatpally, District Ranga Reddy, Telangana, India 3M.Tech Student, School of Information Technology, Kukatpally, District Ranga Reddy, Telangana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— In military environments we tend to are having measure partitions like a parcel or a hostile region. There is little doubt in any respect they suffer from intermittent network property. They are having frequent partitions. Disruption-tolerant network DTN technologiesareisalsotrue and easy solutions. DTN could be a Disruption-tolerant network. It permits devices that are wireless and carried by peoples during a} very military to act each other. These devices take the counsel or management reliably byextending memory module nodes. In these networking environments DTN is very productive technology. Once there is no wired affiliation in between provide and destination device, information from provides node ought to wait among middle nodes for oversized quantity for your duration till the affiliation would be properly established. One among the troublesome approach is also associate ABE. That’s attribute- based cryptography that fulfills the necessities to induce secure information extraction through DTNs. Here the conception is Cipher text Policy ABE (CP-ABE). It provides the applicable suggests that of cryptography of information. The cryptography includes the dataset that the secret writing should possess thus on decode the cipher text. Hence, totally different form of users is also given to decode complete different elements of information in line with the security policy. Index Terms-- Disruption-TolerantNetwork (DTN),Secure Information Recovery, Attribute Based Encryption(ABE); I. INTRODUCTION Disruption tolerant Network progress onward getting to be effective measures that permit hubs to converse with each other in these great systems administration situations Commonly, when there is no limit to-end association between a sources also, a destinationcombine,themessages from the source hub might need to sit tight in the halfway hubs for a generous sum of time until the association would be in the long run set up. Roy and Chuah presented capacity hubs in DTNs where information is put away or repeated such that just approved portable hubs can get to the important data rapidly and productively.Numerousmilitary applications require expanded assurance of con identical information including access control techniques that are cryptographically upheld. By and large, it is alluring to give separated access administrations such that information access arrangements are de fined over client properties or parts, which are overseen by the keypowers.Forinstance, in a disturbance tolerantmilitarysystem,anadministrator may store a con identical data at a capacity hub, which ought to be gotten to by individuals from "Regiment 1" who is taking part in "Area 2." For this situation, it is a sensible presumption that various key powers are liable to deal with their own element characteristics for troopers in their conveyed districts orechelons,whichcouldbeoftenchanged (e.g., the quality speaking to current area of moving troopers) . We allude to this DTN building design where different powers issue also, deal with their own quality keys freely as a decentralized DTN. Notwithstanding, the issue of applying the ABE to DTNs presents a few security and guard challenges Since a few clients may change their related properties eventually (for instance, moving their locale), or some private keys may be traded off, key renouncement (or upgrade) for every quality is vital keeping in mind the end goal to make frameworkssecure.Notwithstanding,thisissue is much more troublesome, particularly in ABE frameworks, since every quality is possibly shared by different clients (from this time forward, we allude to such an accumulation of clients as a quality gathering). This suggests that renouncement of any property or any single client in a property gathering would influence alternate clients in the gathering. Figure 1: Network Architecture
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3499 The last test is the coordination of properties issued from distinguishing control. At the point when various control oversee also, issue credit keys to clients freely with their own expert insider facts, it is difficult to de fine-grained access approaches over properties issued from distinguishing controls.Forinstance,assumethattraits"part 1" and "locale 1" are oversee by the power an, and "part 2" and "area 2" are oversee by the power B. At that point, it is difficult to produce an access approach (("part 1" OR "part 2") AND ("locale 1" or "district 2")) in the past plans on the grounds that the OR rationale between properties issued from diverse powers can't be actualized. This is because of the way that the unique controls create their own quality keys utilizing their own autonomouswhat'smore,individual expert mystery keys. Thusly, general access strategies, for example, “m- out-of-n" rationale, can't be communicated in the past plans, which is an extremely useful and usually required access strategy rationale. II. RELATED WORK The scheme of ABE stands forAttributebased encryption isa promise methodology that satisfies the prerequisites for secure information recovery in DTNs. Attribute based encryption highlights a component that empowers an entrance control overscrambledinformationutilizingaccess strategies and credited properties among private keys and cipher texts. Particularly, cipher text-policy ABE (CP-ABE) gives a versatile method for scrambling information such that the encrypted characterizes the property set that the decrypt needs to have with a specific end goal tounscramble the cipher text. Consequently, diverse clients are permitted to unscramble distinctive bitsofinformationperthesecurity strategy. The issue of applying the Attribute based encryption to DTNs presents a few security and guard challenges. Since a few clients may change their related qualities sooner or later (for instance, moving their locale), or some private keys may be bargained, key disavowal (or overhaul) for every property is importantwitha specificend goal to make frameworks secure. However, this issue is significantly more troublesome, particularly in Attribute based encryption frameworks, since every characteristic is possibly shared by numerous clients (from this time forward, we allude to such an accumulation of clients as a trait bunch). Another test is the key escrow issue. In CP- Attribute based encryption; the key power producesprivate keys of clients by applying the power's expert mystery keys to clients' related arrangement of traits. The last test is the coordination of properties issued from diverse powers. At the point when numerous powers oversee and issue credits keys to clients freely with their own expert insider facts, it is difficult to characterize fine-grained access arrangements over qualities issued from distinctive. III. FRAME WORK In this paper, we propose a quality basedsecureinformation recovery plan utilizing CP-ABE for decentralized DTNs. The proposed plan highlights the associated accomplishments. To begin with, quick quality denial improves in reverse/forward mystery of private information by lessening the windows ofweakness.Second,encryptions can characterize a fine-grained access strategy utilizing any flatness access structure under properties issued from any picked set of powers. Third, the key escrow concern is determined by a sans escrow key issuing convention that endeavors the normal for the decentralized DTN construction modeling. The key issuing convention creates and issues client mystery keys by performing a safe two- party calculation (2PC) conference among the key powers with their own expert insider facts. The 2PC convention deflects the key powers from getting any expert obscurity data of one another such that none of them could produce the entire arrangement of client keys alone. Subsequently, clients are not required to completely believe the commanding voices care in mind the end goal tosecuretheir information to be shared. The information classificationand protection can be cryptographically authorized against any inquisitive key powersorinformationstockpilinghubsin the proposed plan. Data privacy: Unauthorized clients who don't have enough endorsement fulfilling the entrance approach ought to be discouraged from getting to the plain information in the capacity hub. What's more, unapproved access from the capacity hub or key powers ought to be additionally anticipated. Collusion-resistance:Ifnumerousclientsscheme,theymay have the capacity to unscramble a cipher text by combine their characteristics regardless of the possibilitythat eachof the clients can't decode the cipher text single-handedly. Backward and forward Secrecy: In the connection of ABE, in reverse obscurity involve that any client who comes to hold a characteristic (that fulfills the entrance strategy) ought to be kept from getting to the plaintext of the times of yore information traded before he holds the property. Then again, forward obscurity implies that any client who drops a characteristic must to be kept from gettingtotheplaintext of the ensuing information traded after he drops the trait, unless the other extensive belongings that he is holding fulfill the entrance string.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3500 Figure 2: Proposed System Architecture IV. EXPERIMENTAL RESULTS In our experiments, admin login into the system after login into the system to define the access policy here we are going to create Attributes like Battalion 1, Region 1 and Battalion 1, Region 2 and Battalion 1, Region 3, click on Define access policy to each one in the same way to Defineaccesspolicyfor all the Battalions after that keys will be generate for each set of attributes after that assign the policies for all the soldiers in that soldier ID will be taken automatically and we need to give some policy for the selected soldier after that select the updated message in that to send some message to particular battalion like updating the message ‘hello world’ and giving the accessibility for battalion 1 & region 1 after that Updating a message ‘hello’ for battalion 1 & region 2 and same way to Updating a message ‘world for battalion 1 & region 3 after updating the messages the storage node will store all the updated messages.Toclick onsimulationscreen the message which you updated in the update message step message for the soldier-1, 2 or 3 will be displayedherewhen the particular soldier comes nearer to storage node after that to click on revoke keys means We already assigned some soldiers to the specific battalions&regions;inthisstep we can move them from one region to another Moving soldier 3 from battalion 1 region 3 to battalion 2 regions1 Here we moved node 3 from one region to another, so we do not have any key for this node. So whenever the node comes nearer to storage node it cannot access its data to shown in below screens Through our implementation wecandefinetheaccesspolicy for each attributes and also generate the keys and assign the region for each solders after that update the message and keys solders also move to one region to another region the message can be store in storage node based on that we can send the data in efficient and secure manner at lower cost then compare to current protocols. V. CONCLUSION Disruption-Tolerant Network enhancement is getting to be rewarding measures in military applications that authorize inaccessible device to communicate with one another and access the con identical data dependablybymisusingoutside capacity hubs. Cipher text-policy ABE is a versatile cryptographic answer for the entrance control and secures information recovery issues. In this paper, we proposed a expert and secure in sequence improvement approach operate Cipher text-policyABEfordecentralizedDisruption- Tolerant Networkswherevariouskeypowersdeal withtheir qualities autonomously. The innate key escrow issue is determined such that the confidentiality of the put away information is ensured even under the threatening environment where key powers may be traded off or not completely trusted. What's more, the fine-grained key disavowal should be possible for every traitbunch.Weshow
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3501 how to apply the proposed system to safely and effectively deal with the con identical information circulated in the disturbance tolerant military system.Thefuturecanextends user validation for set of attribute in authenticationofmulti- authority network environment. Wecanhidetheattributein access control policy of a user. Different users areallowed to decrypt unrelated parts of data per the security policy. And discuss how to construct a ciphertext-policyattribute-based encryption scheme which would have both: the flexible delegation and attribute revocation properties, without involving a Mediator in the system Architecture. REFERENCES [1] M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp.1–6. [2] M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Pro 2006, pp. 37–48. [3] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated cipher-text-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323. [4] N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,” in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8. [5] D. Huang and M. Verma, “ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,” Ad Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009. [6] A. Lewko and B. Waters, “Decentralizingattribute-based encryption,” Cryptology ePrint Archive: Rep.2010/351, 2010. [7] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Eurocrypt, 2005, pp. 457–473. [8] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- based encryption for fine-grained access control of encrypted data,” in Proc ACM Conf. Comput. Commun. Security, 2006, pp. 89–98. [9] J. Bethencourt, A. Sahai, and B. Waters, “Cipher-text- policy attribute base encryption,” in Proc. IEEE Security Privacy, 2007, pp 321–334. [10] R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based encryption with non-monotonic access structures,” in Proc. Security, 2007, pp. 195–203. [11] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proc. ASIACCS, 2010, pp. 261–270. [12] A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proc. ACM Conf. Security, 2008, pp. 417–426. [13] S. Roy andM. Chuah, “Secure data retrieval based on cipher-text policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009. [14] M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemesforDTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7. [15] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang,and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc. Conf. File Storage Technol., 2003, pp. 29–42. [16] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing forvehicle-baseddisruptiontolerant networks,” in Proc. IEEE INFOCOM, 2006, pp. 1–11.