IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-disruption-tolerant-military-networks

To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org

GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
Secure Data Retrieval for Decentralized Disruption-Tolerant 
Military Networks 
ABSTRACT: 
Mobile nodes in military environments such as a battlefield or a hostile region are 
likely to suffer from intermittent network connectivity and frequent partitions. 
Disruption-tolerant network (DTN) technologies are becoming successful solutions 
that allow wireless devices carried by soldiers to communicate with each other and 
access the confidential information or command reliably by exploiting external 
storage nodes. Some of the most challenging issues in this scenario are the 
enforcement of authorization policies and the policies update for secure data 
retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising 
cryptographic solution to the access control issues. However, the problem of 
applying CP-ABE in decentralized DTNs introduces several security and privacy 
challenges with regard to the attribute revocation, key escrow, and coordination of 
attributes issued from different authorities. In this paper, we propose a secure data 
retrieval scheme using CP-ABE for decentralized DTNs where multiple key 
authorities manage their attributes independently. We demonstrate how to apply
the proposed mechanism to securely and efficiently manage the confidential data 
distributed in the disruption-tolerant military network. 
EXISTING SYSTEM: 
The concept of attribute-based encryption (ABE) is a promising approach that 
fulfills the requirements for secure data retrieval in DTNs. ABE features a 
mechanism that enables an access control over encrypted data using access policies 
and ascribed attributes among private keys and ciphertexts. Especially, ciphertext-policy 
ABE (CP-ABE) provides a scalable way of encrypting data such that the 
encryptor defines the attribute set that the decryptor needs to possess in order to 
decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces 
of data per the security policy. 
DISADVANTAGES OF EXISTING SYSTEM: 
 The problem of applying the ABE to DTNs introduces several security and 
privacy challenges. Since some users may change their associated attributes 
at some point (for example, moving their region), or some private keys 
might be compromised, key revocation (or update) for each attribute is 
necessary in order to make systems secure. 
 However, this issue is even more difficult, especially in ABE systems, since 
each attribute is conceivably shared by multiple users (henceforth, we refer 
to such a collection of users as an attribute group)
 Another challenge is the key escrow problem. In CP-ABE, the key authority 
generates private keys of users by applying the authority’s master secret 
keys to users’ associated set of attributes. 
 The last challenge is the coordination of attributes issued from different 
authorities. When multiple authorities manage and issue attributes keys to 
users independently with their own master secrets, it is very hard to define 
fine-grained access policies over attributes issued from different authorities. 
PROPOSED SYSTEM: 
In this paper, we propose an attribute-based secure data retrieval scheme using CP-ABE 
for decentralized DTNs. The proposed scheme features the following 
achievements. First, immediate attribute revocation enhances backward/forward 
secrecy of confidential data by reducing the windows of vulnerability. Second, 
encryptors can define a fine-grained access policy using any monotone access 
structure under attributes issued from any chosen set of authorities. Third, the key 
escrow problem is resolved by an escrow-free key issuing protocol that exploits the 
characteristic of the decentralized DTN architecture. The key issuing protocol 
generates and issues user secret keys by performing a secure two-party 
computation (2PC) protocol among the key authorities with their own master 
secrets. The 2PC protocol deters the key authorities from obtaining any master 
secret information of each other such that none of them could generate the whole 
set of user keys alone. Thus, users are not required to fully trust the authorities in 
order to protect their data to be shared. The data confidentiality and privacy can be 
cryptographically enforced against any curious key authorities or data storage 
nodes in the proposed scheme.
ADVANTAGES OF PROPOSED SYSTEM: 
 Data confidentiality: Unauthorized users who do not have enough credentials 
satisfying the access policy should be deterred from accessing the plain data in 
the storage node. In addition, unauthorized access from the storage node or 
key authorities should be also prevented. 
 Collusion-resistance: If multiple users collude, they may be able to decrypt a 
ciphertext by combining their attributes even if each of the users cannot 
decrypt the ciphertext alone. 
 Backward and forward Secrecy: In the context of ABE, backward secrecy 
means that any user who comes to hold an attribute (that satisfies the access 
policy) should be prevented from accessing the plaintext of the previous data 
exchanged before he holds the attribute. On the other hand, forward secrecy 
means that any user who drops an attribute should be prevented from 
accessing the plaintext of the subsequent data exchanged after he drops the 
attribute, unless the other valid attributes that he is holding satisfy the access 
policy. 
SYSTEM ARCHITECTURE:
MODULES: 
1. Key Authorities 
2. Storage Nodes 
3. Sender 
4. User 
MODULES DESCRIPTION: 
Key Authorities: 
They are key generation centers that generate public/secret parameters for CP-ABE. 
The key authorities consist of a central authority and multiple local
authorities. We assume that there are secure and reliable communication channels 
between a central authority and each local authority during the initial key setup and 
generation phase. Each local authority manages different attributes and issues 
corresponding attribute keys to users. They grant differential access rights to 
individual users based on the users’ attributes. The key authorities are assumed to 
be honest-but-curious. That is, they will honestly execute the assigned tasks in the 
system; however they would like to learn information of encrypted contents as 
much as possible. 
Storage node: 
This is an entity that stores data from senders and provide corresponding access to 
users. It may be mobile or static. Similar to the previous schemes, we also assume 
the storage node to be semi-trusted that is honest-but-curious. 
Sender: 
This is an entity who owns confidential messages or data (e.g., a commander) and 
wishes to store them into the external data storage node for ease of sharing or for 
reliable delivery to users in the extreme networking environments. A sender is 
responsible for defining (attribute based) access policy and enforcing it on its own 
data by encrypting the data under the policy before storing it to the storage node. 
User: 
This is a mobile node who wants to access the data stored at the storage node (e.g., 
a soldier). If a user possesses a set of attributes satisfying the access policy of the 
encrypted data defined by the sender, and is not revoked in any of the attributes, 
then he will be able to decrypt the ciphertext and obtain the data.
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010 
 Database : SQL SERVER 2008 
REFERENCE: 
Junbeom Hur and Kyungtae Kang, Member, IEEE, ACM “Secure Data Retrieval 
for Decentralized Disruption-Tolerant Military Networks”-IEEE/ACM 
TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014.
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-disruption-tolerant-military-networks

Recomendados

secure data retrieval for decentralized disruption-tolerant military networks por
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networksSneha Joshi
2.9K vistas19 diapositivas
Secure data retrieval for decentralized disruption tolerant military networks por
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksIGEEKS TECHNOLOGIES
11.7K vistas16 diapositivas
secure data retrieval for decentralized disruption-tolerant military networks por
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networksswathi78
1.3K vistas7 diapositivas
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar... por
JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...chennaijp
1.8K vistas9 diapositivas
Secure data retrieval for decentralized disruption tolerant military networks por
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksLeMeniz Infotech
1.9K vistas10 diapositivas
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks por
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksSecure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksIJTET Journal
447 vistas5 diapositivas

Más contenido relacionado

La actualidad más candente

Authentic Data Access Scheme for Variant Disruption- Tolerant Networks por
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
484 vistas3 diapositivas
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce... por
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
339 vistas6 diapositivas
Secure and efficient management of confidential data in the decentralized dis... por
Secure and efficient management of confidential data in the decentralized dis...Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...theijes
516 vistas5 diapositivas
A review on key aggregate cryptosystem for scalable data sharing in cloud sto... por
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
74 vistas4 diapositivas
V5 i7 0169 por
V5 i7 0169V5 i7 0169
V5 i7 0169Siddhartha Bashetty
117 vistas5 diapositivas
IJSRED-V2I3P52 por
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
14 vistas4 diapositivas

La actualidad más candente(19)

Authentic Data Access Scheme for Variant Disruption- Tolerant Networks por Editor IJCATR
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Editor IJCATR484 vistas
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce... por revathirram
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
revathirram339 vistas
Secure and efficient management of confidential data in the decentralized dis... por theijes
Secure and efficient management of confidential data in the decentralized dis...Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...
theijes516 vistas
A review on key aggregate cryptosystem for scalable data sharing in cloud sto... por eSAT Journals
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals74 vistas
IJSRED-V2I3P52 por IJSRED
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED14 vistas
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD por Naseem nisar
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar14.7K vistas
Hierarchical Key Agreement Protocol for Wireless Sensor Networks por idescitation
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
idescitation590 vistas
Security Analysis and Improvement for IEEE 802.11i por inventionjournals
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
inventionjournals76 vistas
Key aggregate searchable encryption (kase) for group data sharing via cloud s... por Pvrtechnologies Nellore
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
File transfer using cryptography techniques por miteshkumar82
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
miteshkumar825.5K vistas
F018133640.key aggregate paper por IOSR Journals
F018133640.key aggregate paperF018133640.key aggregate paper
F018133640.key aggregate paper
IOSR Journals74 vistas
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo... por Editor IJCATR
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR124 vistas
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ... por IRJET Journal
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
IRJET Journal30 vistas
efficient authentication for mobile and pervasive computing por swathi78
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
swathi78776 vistas
Vtu network security(10 ec832) unit 2 notes.. por Jayanth Dwijesh H P
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P2.4K vistas
Decentralized access control of data stored in cloud using key policy attribu... por Adz91 Digital Ads Pvt Ltd
Decentralized access control of data stored in cloud using key policy attribu...Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...
Efficient authentication for mobile and pervasive computing por IGEEKS TECHNOLOGIES
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES3.2K vistas

Similar a IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-disruption-tolerant-military-networks

Ijcatr04051007 por
Ijcatr04051007Ijcatr04051007
Ijcatr04051007Editor IJCATR
580 vistas6 diapositivas
Application of CP-ABE Scheme in Data Sharing System for confidentiality por
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityEditor IJMTER
549 vistas8 diapositivas
Paper2 por
Paper2Paper2
Paper2Vikas Khairnar
129 vistas4 diapositivas
Attribute Based Secure Information Recovery Retrieval System for Decentralize... por
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...IRJET Journal
64 vistas4 diapositivas
Privacypreservingdelegatedaccesscontrolinpublicclouds por
Privacypreservingdelegatedaccesscontrolinpublicclouds Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Shakas Technologies
92 vistas5 diapositivas
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion... por
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Shakas Technologies
180 vistas5 diapositivas

Similar a IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-disruption-tolerant-military-networks(20)

Application of CP-ABE Scheme in Data Sharing System for confidentiality por Editor IJMTER
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Editor IJMTER549 vistas
Attribute Based Secure Information Recovery Retrieval System for Decentralize... por IRJET Journal
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
IRJET Journal64 vistas
Privacypreservingdelegatedaccesscontrolinpublicclouds por Shakas Technologies
Privacypreservingdelegatedaccesscontrolinpublicclouds Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion... por Shakas Technologies
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Shakas Technologies180 vistas
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho... por IJCERT JOURNAL
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
IJCERT JOURNAL280 vistas
Privacy preserving delegated access control in public clouds por JPINFOTECH JAYAPRAKASH
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing por IRJET Journal
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal19 vistas
Iaetsd a framework for secure data por Iaetsd Iaetsd
Iaetsd a framework for secure dataIaetsd a framework for secure data
Iaetsd a framework for secure data
Iaetsd Iaetsd356 vistas
Psdot 12 a secure erasure code-based cloud storage por ZTech Proje
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje1.2K vistas
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con... por IEEEGLOBALSOFTTECHNOLOGIES
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
Privacy preserving delegated access control in public clouds por IEEEFINALYEARPROJECTS
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS3.5K vistas
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt... por Eswar Publications
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Eswar Publications104 vistas
documentation for identity based secure distrbuted data storage schemes por Sahithi Naraparaju
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
Sahithi Naraparaju3.9K vistas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal35 vistas
Achieving Secure, sclable and finegrained Cloud computing report por Kiran Girase
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase489 vistas
Privacy preserving delegated access control in public cloud por Aswathy Rajan
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloud
Aswathy Rajan1.3K vistas
IRJET - Identifying Information Relocate with Reliable Estimation and Sec... por IRJET Journal
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal7 vistas

Más de IEEEMEMTECHSTUDENTPROJECTS

IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp... por
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...IEEEMEMTECHSTUDENTPROJECTS
504 vistas5 diapositivas
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ... por
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...IEEEMEMTECHSTUDENTPROJECTS
323 vistas4 diapositivas
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ... por
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...IEEEMEMTECHSTUDENTPROJECTS
273 vistas4 diapositivas
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over por
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEEMEMTECHSTUDENTPROJECTS
450 vistas9 diapositivas
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m... por
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...IEEEMEMTECHSTUDENTPROJECTS
229 vistas3 diapositivas
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe... por
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...IEEEMEMTECHSTUDENTPROJECTS
260 vistas5 diapositivas

Más de IEEEMEMTECHSTUDENTPROJECTS(20)

IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...

Último

GDSC Mikroskil Members Onboarding 2023.pdf por
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdfgdscmikroskil
58 vistas62 diapositivas
DESIGN OF SPRINGS-UNIT4.pptx por
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptxgopinathcreddy
19 vistas47 diapositivas
DevOps-ITverse-2023-IIT-DU.pptx por
DevOps-ITverse-2023-IIT-DU.pptxDevOps-ITverse-2023-IIT-DU.pptx
DevOps-ITverse-2023-IIT-DU.pptxAnowar Hossain
12 vistas45 diapositivas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptxlwang78
109 vistas19 diapositivas
SPICE PARK DEC2023 (6,625 SPICE Models) por
SPICE PARK DEC2023 (6,625 SPICE Models) SPICE PARK DEC2023 (6,625 SPICE Models)
SPICE PARK DEC2023 (6,625 SPICE Models) Tsuyoshi Horigome
33 vistas218 diapositivas
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth por
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for GrowthInnomantra
6 vistas4 diapositivas

Último(20)

GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil58 vistas
DevOps-ITverse-2023-IIT-DU.pptx por Anowar Hossain
DevOps-ITverse-2023-IIT-DU.pptxDevOps-ITverse-2023-IIT-DU.pptx
DevOps-ITverse-2023-IIT-DU.pptx
Anowar Hossain12 vistas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78109 vistas
SPICE PARK DEC2023 (6,625 SPICE Models) por Tsuyoshi Horigome
SPICE PARK DEC2023 (6,625 SPICE Models) SPICE PARK DEC2023 (6,625 SPICE Models)
SPICE PARK DEC2023 (6,625 SPICE Models)
Tsuyoshi Horigome33 vistas
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth por Innomantra
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra 6 vistas
MongoDB.pdf por ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR345 vistas
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy33 vistas
Searching in Data Structure por raghavbirla63
Searching in Data StructureSearching in Data Structure
Searching in Data Structure
raghavbirla6314 vistas
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli15 vistas
Ansari: Practical experiences with an LLM-based Islamic Assistant por M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous5 vistas
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra816 vistas
_MAKRIADI-FOTEINI_diploma thesis.pptx por fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi8 vistas
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli10 vistas
Proposal Presentation.pptx por keytonallamon
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptx
keytonallamon52 vistas
Generative AI Models & Their Applications por SN
Generative AI Models & Their ApplicationsGenerative AI Models & Their Applications
Generative AI Models & Their Applications
SN10 vistas

IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-disruption-tolerant-military-networks

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks ABSTRACT: Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply
  • 2. the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network. EXISTING SYSTEM: The concept of attribute-based encryption (ABE) is a promising approach that fulfills the requirements for secure data retrieval in DTNs. ABE features a mechanism that enables an access control over encrypted data using access policies and ascribed attributes among private keys and ciphertexts. Especially, ciphertext-policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy. DISADVANTAGES OF EXISTING SYSTEM:  The problem of applying the ABE to DTNs introduces several security and privacy challenges. Since some users may change their associated attributes at some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each attribute is necessary in order to make systems secure.  However, this issue is even more difficult, especially in ABE systems, since each attribute is conceivably shared by multiple users (henceforth, we refer to such a collection of users as an attribute group)
  • 3.  Another challenge is the key escrow problem. In CP-ABE, the key authority generates private keys of users by applying the authority’s master secret keys to users’ associated set of attributes.  The last challenge is the coordination of attributes issued from different authorities. When multiple authorities manage and issue attributes keys to users independently with their own master secrets, it is very hard to define fine-grained access policies over attributes issued from different authorities. PROPOSED SYSTEM: In this paper, we propose an attribute-based secure data retrieval scheme using CP-ABE for decentralized DTNs. The proposed scheme features the following achievements. First, immediate attribute revocation enhances backward/forward secrecy of confidential data by reducing the windows of vulnerability. Second, encryptors can define a fine-grained access policy using any monotone access structure under attributes issued from any chosen set of authorities. Third, the key escrow problem is resolved by an escrow-free key issuing protocol that exploits the characteristic of the decentralized DTN architecture. The key issuing protocol generates and issues user secret keys by performing a secure two-party computation (2PC) protocol among the key authorities with their own master secrets. The 2PC protocol deters the key authorities from obtaining any master secret information of each other such that none of them could generate the whole set of user keys alone. Thus, users are not required to fully trust the authorities in order to protect their data to be shared. The data confidentiality and privacy can be cryptographically enforced against any curious key authorities or data storage nodes in the proposed scheme.
  • 4. ADVANTAGES OF PROPOSED SYSTEM:  Data confidentiality: Unauthorized users who do not have enough credentials satisfying the access policy should be deterred from accessing the plain data in the storage node. In addition, unauthorized access from the storage node or key authorities should be also prevented.  Collusion-resistance: If multiple users collude, they may be able to decrypt a ciphertext by combining their attributes even if each of the users cannot decrypt the ciphertext alone.  Backward and forward Secrecy: In the context of ABE, backward secrecy means that any user who comes to hold an attribute (that satisfies the access policy) should be prevented from accessing the plaintext of the previous data exchanged before he holds the attribute. On the other hand, forward secrecy means that any user who drops an attribute should be prevented from accessing the plaintext of the subsequent data exchanged after he drops the attribute, unless the other valid attributes that he is holding satisfy the access policy. SYSTEM ARCHITECTURE:
  • 5. MODULES: 1. Key Authorities 2. Storage Nodes 3. Sender 4. User MODULES DESCRIPTION: Key Authorities: They are key generation centers that generate public/secret parameters for CP-ABE. The key authorities consist of a central authority and multiple local
  • 6. authorities. We assume that there are secure and reliable communication channels between a central authority and each local authority during the initial key setup and generation phase. Each local authority manages different attributes and issues corresponding attribute keys to users. They grant differential access rights to individual users based on the users’ attributes. The key authorities are assumed to be honest-but-curious. That is, they will honestly execute the assigned tasks in the system; however they would like to learn information of encrypted contents as much as possible. Storage node: This is an entity that stores data from senders and provide corresponding access to users. It may be mobile or static. Similar to the previous schemes, we also assume the storage node to be semi-trusted that is honest-but-curious. Sender: This is an entity who owns confidential messages or data (e.g., a commander) and wishes to store them into the external data storage node for ease of sharing or for reliable delivery to users in the extreme networking environments. A sender is responsible for defining (attribute based) access policy and enforcing it on its own data by encrypting the data under the policy before storing it to the storage node. User: This is a mobile node who wants to access the data stored at the storage node (e.g., a soldier). If a user possesses a set of attributes satisfying the access policy of the encrypted data defined by the sender, and is not revoked in any of the attributes, then he will be able to decrypt the ciphertext and obtain the data.
  • 7. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Junbeom Hur and Kyungtae Kang, Member, IEEE, ACM “Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks”-IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014.