secure data retrieval for decentralized disruption-tolerant military networks

S

LOGIC SYSTEMS 1st Floor, Reddy Comlex, Opp. SPencers, Near Satyam Theatre, Ameerpet, Hyderabad 9533694296,9703109334 logicsystemsprojects@gmail.com www.logicsystems.org.in

Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks 
Secure Data Retrieval For Decentralized Disruption-Tolerant 
Military Networks 
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer 
from intermittent network connectivity and frequent partitions. Disruption-tolerant network 
(DTN) technologies are becoming successful solutions that allow wireless devices carried by 
soldiers to communicate with each other and access the confidential information or command 
reliably by exploiting external storage nodes. Some of the most challenging issues in this 
scenario are the enforcement of authorization policies and the policies update for secure data 
retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic 
solution to the access control issues. However, the problem of applying CP-ABE in decentralized 
DTNs introduces several security and privacy challenges with regard to the attribute revocation, 
key escrow, and coordination of attributes issued from different authorities. In this paper, we 
propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple 
key authorities manage their attributes independently. We demonstrate how to apply the 
proposed mechanism to securely and efficiently manage the confidential data distributed in the 
disruption-tolerant military network. 
The concept of attribute-based encryption (ABE) is a promising approach that fulfills the 
requirements for secure data retrieval in DTNs. ABE features a mechanism that enables an 
access control over encrypted data using access policies and ascribed attributes among private 
keys and ciphertexts. Especially, ciphertext-policy ABE (CP-ABE) provides a scalable way of 
encrypting data such that the encryptor defines the attribute set that the decryptor needs to 
possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different 
pieces of data per the security policy. 
Contact: 9703109334, 9533694296 
ABSTRACT: 
EXISTING SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks 
DISADVANTAGES OF EXISTING SYSTEM: 
 The problem of applying the ABE to DTNs introduces several security and privacy 
challenges. Since some users may change their associated attributes at some point (for 
example, moving their region), or some private keys might be compromised, key 
revocation (or update) for each attribute is necessary in order to make systems secure. 
 However, this issue is even more difficult, especially in ABE systems, since each 
attribute is conceivably shared by multiple users (henceforth, we refer to such a collection 
of users as an attribute group) 
 Another challenge is the key escrow problem. In CP-ABE, the key authority generates 
private keys of users by applying the authority’s master secret keys to users’ associated 
set of attributes. 
 The last challenge is the coordination of attributes issued from different authorities. 
When multiple authorities manage and issue attributes keys to users independently with 
their own master secrets, it is very hard to define fine-grained access policies over 
attributes issued from different authorities. 
In this paper, we propose an attribute-based secure data retrieval scheme using CP-ABE for 
decentralized DTNs. The proposed scheme features the following achievements. First, 
immediate attribute revocation enhances backward/forward secrecy of confidential data by 
reducing the windows of vulnerability. Second, encryptors can define a fine-grained access 
policy using any monotone access structure under attributes issued from any chosen set of 
authorities. Third, the key escrow problem is resolved by an escrow- free key issuing protocol 
that exploits the characteristic of the decentralized DTN architecture. The key issuing protocol 
generates and issues user secret keys by performing a secure two-party computation (2PC) 
protocol among the key authorities with their own master secrets. The 2PC protocol deters the 
key authorities from obtaining any master secret information of each other such that none of 
them could generate the whole set of user keys alone. Thus, users are not required to fully trust 
the authorities in order to protect their data to be shared. The data confidentiality and privacy can 
be cryptographically enforced against any curious key authorities or data storage nodes in the 
proposed scheme. 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks 
ADVANTAGES OF PROPOSED SYSTEM: 
 Data confidentiality: Unauthorized users who do not have enough credentials satisfying 
the access policy should be deterred from accessing the plain data in the storage node. In 
addition, unauthorized access from the storage node or key authorities should be also 
prevented. 
 Collusion-resistance: If multiple users collude, they may be able to decrypt a ciphertext by 
combining their attributes even if each of the users cannot decrypt the ciphertext alone. 
 Backward and forward Secrecy: In the context of ABE, backward secrecy means that 
any user who comes to hold an attribute (that satisfies the access policy) should be 
prevented from accessing the plaintext of the previous data exchanged before he holds the 
attribute. On the other hand, forward secrecy means that any user who drops an attribute 
should be prevented from accessing the plaintext of the subsequent data exchanged after he 
drops the attribute, unless the other valid attributes that he is holding satisfy the access 
policy. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks 
SYSTEM ARCHITECTURE: 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
MODULES: 
1. Key Authorities 
2. Storage Nodes 
3. Sender 
4. User 
MODULES DESCRIPTION: 
Key Authorities: 
They are key generation centers that generate public/secret parameters for CP-ABE. The key 
authorities consist of a central authority and multiple local authorities. We assume that there are 
secure and reliable communication channels between a central authority and each local authority 
during the initial key setup and generation phase. Each local authority manages different
Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks 
attributes and issues corresponding attribute keys to users. They grant differential access rights to 
individual users based on the users’ attributes. The key authorities are assumed to be honest-but-curious. 
That is, they will honestly execute the assigned tasks in the system; however they would 
like to learn information of encrypted contents as much as possible. 
This is an entity that stores data from senders and provide corresponding access to users. It may 
be mobile or static. Similar to the previous schemes, we also assume the storage node to be semi-trusted 
that is honest-but-curious. 
Contact: 9703109334, 9533694296 
Storage node: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
Sender: 
This is an entity who owns confidential messages or data (e.g., a commander) and wishes to store 
them into the external data storage node for ease of sharing or for reliable delivery to users in the 
extreme networking environments. A sender is responsible for defining (attribute based) access 
policy and enforcing it on its own data by encrypting the data under the policy before storing it to 
the storage node. 
User: 
This is a mobile node who wants to access the data stored at the storage node (e.g., a soldier). If a 
user possesses a set of attributes satisfying the access policy of the encrypted data defined by the 
sender, and is not revoked in any of the attributes, then he will be able to decrypt the ciphertext 
and obtain the data.
Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Junbeom Hur and K yungtae Kang, Member, IEEE, ACM “Secure Data Retrieval for 
Decentralized Disruption-Tolerant Military Networks”-IEEE/ACM TRANSACTIONS ON 
NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

Recomendados

Secure data retrieval for decentralized disruption tolerant military networks por
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksIGEEKS TECHNOLOGIES
11.7K vistas16 diapositivas
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar... por
JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...chennaijp
1.8K vistas9 diapositivas
secure data retrieval for decentralized disruption-tolerant military networks por
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networksSneha Joshi
2.9K vistas19 diapositivas
Secure data retrieval for decentralized disruption tolerant military networks por
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksLeMeniz Infotech
1.9K vistas10 diapositivas
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks por
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksSecure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksIJTET Journal
447 vistas5 diapositivas
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-... por
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEEMEMTECHSTUDENTPROJECTS
582 vistas8 diapositivas

Más contenido relacionado

La actualidad más candente

Authentic Data Access Scheme for Variant Disruption- Tolerant Networks por
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
484 vistas3 diapositivas
Secure and efficient management of confidential data in the decentralized dis... por
Secure and efficient management of confidential data in the decentralized dis...Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...theijes
516 vistas5 diapositivas
V5 i7 0169 por
V5 i7 0169V5 i7 0169
V5 i7 0169Siddhartha Bashetty
117 vistas5 diapositivas
A review on key aggregate cryptosystem for scalable data sharing in cloud sto... por
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
74 vistas4 diapositivas
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce... por
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
339 vistas6 diapositivas
IJSRED-V2I3P52 por
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
14 vistas4 diapositivas

La actualidad más candente(20)

Authentic Data Access Scheme for Variant Disruption- Tolerant Networks por Editor IJCATR
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Editor IJCATR484 vistas
Secure and efficient management of confidential data in the decentralized dis... por theijes
Secure and efficient management of confidential data in the decentralized dis...Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...
theijes516 vistas
A review on key aggregate cryptosystem for scalable data sharing in cloud sto... por eSAT Journals
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals74 vistas
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce... por revathirram
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
revathirram339 vistas
IJSRED-V2I3P52 por IJSRED
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED14 vistas
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD por Naseem nisar
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar14.7K vistas
Key aggregate searchable encryption (kase) for group data sharing via cloud s... por Pvrtechnologies Nellore
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo... por Editor IJCATR
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR124 vistas
Security Analysis and Improvement for IEEE 802.11i por inventionjournals
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
inventionjournals76 vistas
Secure Redundant Data Avoidance over Multi-Cloud Architecture. por IJCERT JOURNAL
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL224 vistas
Decentralized access control with anonymous authentication of data stored in ... por Adz91 Digital Ads Pvt Ltd
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T... por IJNSA Journal
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal397 vistas
F018133640.key aggregate paper por IOSR Journals
F018133640.key aggregate paperF018133640.key aggregate paper
F018133640.key aggregate paper
IOSR Journals74 vistas
Decentralized access control with anonymous authentication of data stored in ... por IGEEKS TECHNOLOGIES
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
IGEEKS TECHNOLOGIES8.3K vistas
Hierarchical Key Agreement Protocol for Wireless Sensor Networks por idescitation
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
idescitation590 vistas
Decentralized access control with anonymous authentication of data stored in ... por Nexgen Technology
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Nexgen Technology 1.4K vistas
Efficient authentication for mobile and pervasive computing por IGEEKS TECHNOLOGIES
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES3.2K vistas
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib... por Pvrtechnologies Nellore
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...

Destacado

Ankara Cloud Meetup 6. Etkinlik Scaling Real-Time Messaging on Cloud Sunumu por
Ankara Cloud Meetup 6. Etkinlik Scaling Real-Time Messaging on Cloud SunumuAnkara Cloud Meetup 6. Etkinlik Scaling Real-Time Messaging on Cloud Sunumu
Ankara Cloud Meetup 6. Etkinlik Scaling Real-Time Messaging on Cloud Sunumuİbrahim Gürses
154 vistas15 diapositivas
Secure Data Sharing with ABE in Wireless Sensor Networks por
Secure Data Sharing with ABE in Wireless Sensor NetworksSecure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksComputer Science Journals
444 vistas11 diapositivas
A survey on encryption algorithms for data security por
A survey on encryption algorithms for data securityA survey on encryption algorithms for data security
A survey on encryption algorithms for data securityeSAT Journals
136 vistas4 diapositivas
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE... por
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
92 vistas5 diapositivas
2014 java ieee por
2014 java ieee2014 java ieee
2014 java ieeeAnand Buddarapu
543 vistas25 diapositivas
MultiModal Image Search on Mobile Device por
MultiModal Image Search on Mobile DeviceMultiModal Image Search on Mobile Device
MultiModal Image Search on Mobile DeviceShailesh kumar
1.3K vistas28 diapositivas

Destacado(14)

Ankara Cloud Meetup 6. Etkinlik Scaling Real-Time Messaging on Cloud Sunumu por İbrahim Gürses
Ankara Cloud Meetup 6. Etkinlik Scaling Real-Time Messaging on Cloud SunumuAnkara Cloud Meetup 6. Etkinlik Scaling Real-Time Messaging on Cloud Sunumu
Ankara Cloud Meetup 6. Etkinlik Scaling Real-Time Messaging on Cloud Sunumu
İbrahim Gürses154 vistas
A survey on encryption algorithms for data security por eSAT Journals
A survey on encryption algorithms for data securityA survey on encryption algorithms for data security
A survey on encryption algorithms for data security
eSAT Journals136 vistas
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE... por AM Publications
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
AM Publications92 vistas
MultiModal Image Search on Mobile Device por Shailesh kumar
MultiModal Image Search on Mobile DeviceMultiModal Image Search on Mobile Device
MultiModal Image Search on Mobile Device
Shailesh kumar1.3K vistas
COMP8045 - Project Report v.1.3 por Soon Zoo Kwon
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3
Soon Zoo Kwon584 vistas
Introduction to google cloud messaging in android por RIA RUI Society
Introduction to google cloud messaging in androidIntroduction to google cloud messaging in android
Introduction to google cloud messaging in android
RIA RUI Society14.1K vistas
Google Cloud Messaging por Prajyot Mainkar
Google Cloud Messaging Google Cloud Messaging
Google Cloud Messaging
Prajyot Mainkar13.4K vistas

Similar a secure data retrieval for decentralized disruption-tolerant military networks

2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d... por
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...IEEEFINALSEMSTUDENTSPROJECTS
547 vistas8 diapositivas
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE... por
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
179 vistas5 diapositivas
Paper2 por
Paper2Paper2
Paper2Vikas Khairnar
129 vistas4 diapositivas
Iaetsd a framework for secure data por
Iaetsd a framework for secure dataIaetsd a framework for secure data
Iaetsd a framework for secure dataIaetsd Iaetsd
356 vistas7 diapositivas
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt... por
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
104 vistas5 diapositivas
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami... por
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
81 vistas5 diapositivas

Similar a secure data retrieval for decentralized disruption-tolerant military networks(20)

COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE... por AM Publications
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
AM Publications179 vistas
Iaetsd a framework for secure data por Iaetsd Iaetsd
Iaetsd a framework for secure dataIaetsd a framework for secure data
Iaetsd a framework for secure data
Iaetsd Iaetsd356 vistas
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt... por Eswar Publications
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Eswar Publications104 vistas
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami... por IOSRjournaljce
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
IOSRjournaljce81 vistas
Psdot 12 a secure erasure code-based cloud storage por ZTech Proje
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje1.2K vistas
Privacypreservingdelegatedaccesscontrolinpublicclouds por Shakas Technologies
Privacypreservingdelegatedaccesscontrolinpublicclouds Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion... por Shakas Technologies
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Shakas Technologies180 vistas
Iaetsd secure data sharing of multi-owner groups in cloud por Iaetsd Iaetsd
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd Iaetsd395 vistas
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ... por IRJET Journal
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
IRJET Journal30 vistas
Attribute Based Secure Information Recovery Retrieval System for Decentralize... por IRJET Journal
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
IRJET Journal64 vistas
A robust and verifiable threshold multi authority access control system in pu... por IJARIIT
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT33 vistas
Fragmentation of Data in Large-Scale System For Ideal Performance and Security por Editor IJCATR
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Editor IJCATR257 vistas
Privacy preserving delegated access control in public clouds por JPINFOTECH JAYAPRAKASH
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and... por IRJET Journal
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal21 vistas
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con... por IEEEGLOBALSOFTTECHNOLOGIES
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
Privacy preserving delegated access control in public clouds por IEEEFINALYEARPROJECTS
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS3.5K vistas

Más de swathi78

secure mining of association rules in horizontally distributed databases por
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasesswathi78
484 vistas4 diapositivas
a system for denial-of-service attack detection based on multivariate correla... por
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
724 vistas7 diapositivas
web service recommendation via exploiting location and qo s information por
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationswathi78
701 vistas5 diapositivas
privacy-enhanced web service composition por
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service compositionswathi78
500 vistas6 diapositivas
optimal distributed malware defense in mobile networks with heterogeneous dev... por
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...swathi78
342 vistas4 diapositivas
friend book a semantic-based friend recommendation system for social networks por
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksswathi78
1.2K vistas3 diapositivas

Más de swathi78(20)

secure mining of association rules in horizontally distributed databases por swathi78
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
swathi78484 vistas
a system for denial-of-service attack detection based on multivariate correla... por swathi78
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
swathi78724 vistas
web service recommendation via exploiting location and qo s information por swathi78
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
swathi78701 vistas
privacy-enhanced web service composition por swathi78
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
swathi78500 vistas
optimal distributed malware defense in mobile networks with heterogeneous dev... por swathi78
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78342 vistas
friend book a semantic-based friend recommendation system for social networks por swathi78
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networks
swathi781.2K vistas
efficient authentication for mobile and pervasive computing por swathi78
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
swathi78776 vistas
cooperative caching for efficient data access in disruption tolerant networks por swathi78
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
swathi78346 vistas
an incentive framework for cellular traffic offloading por swathi78
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
swathi78342 vistas
secure outsourced attribute-based signatures por swathi78
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
swathi78291 vistas
traffic pattern-based content leakage detection for trusted content delivery ... por swathi78
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78226 vistas
the design and evaluation of an information sharing system for human networks por swathi78
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
swathi78328 vistas
the client assignment problem for continuous distributed interactive applicat... por swathi78
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
swathi78406 vistas
sos a distributed mobile q&a system based on social networks por swathi78
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
swathi78263 vistas
securing broker-less publish subscribe systems using identity-based encryption por swathi78
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
swathi78370 vistas
rre a game-theoretic intrusion response and recovery engine por swathi78
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
swathi78266 vistas
on false data-injection attacks against power system state estimation modelin... por swathi78
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
swathi78211 vistas
loca ward a security and privacy aware location-based rewarding system por swathi78
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
swathi78283 vistas
exploiting service similarity for privacy in location-based search queries por swathi78
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
swathi78649 vistas
enabling trustworthy service evaluation in service-oriented mobile social net... por swathi78
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78401 vistas

Último

Ansari: Practical experiences with an LLM-based Islamic Assistant por
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic AssistantM Waleed Kadous
9 vistas29 diapositivas
REACTJS.pdf por
REACTJS.pdfREACTJS.pdf
REACTJS.pdfArthyR3
37 vistas16 diapositivas
Web Dev Session 1.pptx por
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptxVedVekhande
17 vistas22 diapositivas
Pitchbook Repowerlab.pdf por
Pitchbook Repowerlab.pdfPitchbook Repowerlab.pdf
Pitchbook Repowerlab.pdfVictoriaGaleano
6 vistas12 diapositivas
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf por
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfAlhamduKure
8 vistas11 diapositivas
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth por
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for GrowthInnomantra
15 vistas4 diapositivas

Último(20)

Ansari: Practical experiences with an LLM-based Islamic Assistant por M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous9 vistas
REACTJS.pdf por ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR337 vistas
Web Dev Session 1.pptx por VedVekhande
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptx
VedVekhande17 vistas
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf por AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure8 vistas
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth por Innomantra
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra 15 vistas
SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 22 vistas
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn8 vistas
Créativité dans le design mécanique à l’aide de l’optimisation topologique por LIEGE CREATIVE
Créativité dans le design mécanique à l’aide de l’optimisation topologiqueCréativité dans le design mécanique à l’aide de l’optimisation topologique
Créativité dans le design mécanique à l’aide de l’optimisation topologique
LIEGE CREATIVE8 vistas
MongoDB.pdf por ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR349 vistas
Proposal Presentation.pptx por keytonallamon
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptx
keytonallamon67 vistas
Design_Discover_Develop_Campaign.pptx por ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth649 vistas
_MAKRIADI-FOTEINI_diploma thesis.pptx por fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi12 vistas

secure data retrieval for decentralized disruption-tolerant military networks

  • 1. Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network. The concept of attribute-based encryption (ABE) is a promising approach that fulfills the requirements for secure data retrieval in DTNs. ABE features a mechanism that enables an access control over encrypted data using access policies and ascribed attributes among private keys and ciphertexts. Especially, ciphertext-policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy. Contact: 9703109334, 9533694296 ABSTRACT: EXISTING SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks DISADVANTAGES OF EXISTING SYSTEM:  The problem of applying the ABE to DTNs introduces several security and privacy challenges. Since some users may change their associated attributes at some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each attribute is necessary in order to make systems secure.  However, this issue is even more difficult, especially in ABE systems, since each attribute is conceivably shared by multiple users (henceforth, we refer to such a collection of users as an attribute group)  Another challenge is the key escrow problem. In CP-ABE, the key authority generates private keys of users by applying the authority’s master secret keys to users’ associated set of attributes.  The last challenge is the coordination of attributes issued from different authorities. When multiple authorities manage and issue attributes keys to users independently with their own master secrets, it is very hard to define fine-grained access policies over attributes issued from different authorities. In this paper, we propose an attribute-based secure data retrieval scheme using CP-ABE for decentralized DTNs. The proposed scheme features the following achievements. First, immediate attribute revocation enhances backward/forward secrecy of confidential data by reducing the windows of vulnerability. Second, encryptors can define a fine-grained access policy using any monotone access structure under attributes issued from any chosen set of authorities. Third, the key escrow problem is resolved by an escrow- free key issuing protocol that exploits the characteristic of the decentralized DTN architecture. The key issuing protocol generates and issues user secret keys by performing a secure two-party computation (2PC) protocol among the key authorities with their own master secrets. The 2PC protocol deters the key authorities from obtaining any master secret information of each other such that none of them could generate the whole set of user keys alone. Thus, users are not required to fully trust the authorities in order to protect their data to be shared. The data confidentiality and privacy can be cryptographically enforced against any curious key authorities or data storage nodes in the proposed scheme. Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks ADVANTAGES OF PROPOSED SYSTEM:  Data confidentiality: Unauthorized users who do not have enough credentials satisfying the access policy should be deterred from accessing the plain data in the storage node. In addition, unauthorized access from the storage node or key authorities should be also prevented.  Collusion-resistance: If multiple users collude, they may be able to decrypt a ciphertext by combining their attributes even if each of the users cannot decrypt the ciphertext alone.  Backward and forward Secrecy: In the context of ABE, backward secrecy means that any user who comes to hold an attribute (that satisfies the access policy) should be prevented from accessing the plaintext of the previous data exchanged before he holds the attribute. On the other hand, forward secrecy means that any user who drops an attribute should be prevented from accessing the plaintext of the subsequent data exchanged after he drops the attribute, unless the other valid attributes that he is holding satisfy the access policy. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks SYSTEM ARCHITECTURE: Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in MODULES: 1. Key Authorities 2. Storage Nodes 3. Sender 4. User MODULES DESCRIPTION: Key Authorities: They are key generation centers that generate public/secret parameters for CP-ABE. The key authorities consist of a central authority and multiple local authorities. We assume that there are secure and reliable communication channels between a central authority and each local authority during the initial key setup and generation phase. Each local authority manages different
  • 5. Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks attributes and issues corresponding attribute keys to users. They grant differential access rights to individual users based on the users’ attributes. The key authorities are assumed to be honest-but-curious. That is, they will honestly execute the assigned tasks in the system; however they would like to learn information of encrypted contents as much as possible. This is an entity that stores data from senders and provide corresponding access to users. It may be mobile or static. Similar to the previous schemes, we also assume the storage node to be semi-trusted that is honest-but-curious. Contact: 9703109334, 9533694296 Storage node: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in Sender: This is an entity who owns confidential messages or data (e.g., a commander) and wishes to store them into the external data storage node for ease of sharing or for reliable delivery to users in the extreme networking environments. A sender is responsible for defining (attribute based) access policy and enforcing it on its own data by encrypting the data under the policy before storing it to the storage node. User: This is a mobile node who wants to access the data stored at the storage node (e.g., a soldier). If a user possesses a set of attributes satisfying the access policy of the encrypted data defined by the sender, and is not revoked in any of the attributes, then he will be able to decrypt the ciphertext and obtain the data.
  • 6. Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Junbeom Hur and K yungtae Kang, Member, IEEE, ACM “Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks”-IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 7. Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in