Secure Data Key Retrieval for Decentralized Disruption Tolerant Military Networks

Authors(6) :-Prof. Devika Deshmukh, Aditi Zade, Dhanashri Jumade, Sharvari Katyayan, Neha Thakare, Harshada Shende

In the Disruption tolerant network technologies have successful solutions that has wireless devices carried by soldiers to communicate and access the confidential information reliably by external storage nodes. Some of the most challenging problem in this way the enforcement of authorization system and the policies are for secure data retrieval. The Ciphertext policy based encryption has a cryptographic solution to the access control problem. The problem of applying in decentralized has several security and privacy problem with regard to the attribute key, and supplies for the different authorities. The propose a secure data retrieval scheme using 3DES for decentralized where multiple key authorities manage their attributes independently. To demonstrate how to apply the proposed system to securely and which manage the confidential data distributed in the disruption military network.

Authors and Affiliations

Prof. Devika Deshmukh
Anjuman College of Engineering and Technology, Nagpur, Nagpur, Maharashtra, India
Aditi Zade
Anjuman College of Engineering and Technology, Nagpur, Nagpur, Maharashtra, India
Dhanashri Jumade
Anjuman College of Engineering and Technology, Nagpur, Nagpur, Maharashtra, India
Sharvari Katyayan
Anjuman College of Engineering and Technology, Nagpur, Nagpur, Maharashtra, India
Neha Thakare
Anjuman College of Engineering and Technology, Nagpur, Nagpur, Maharashtra, India
Harshada Shende
Anjuman College of Engineering and Technology, Nagpur, Nagpur, Maharashtra, India

Triple Data Encryption Algorithm, Disruption-Tolerant Network, Multiauthority, Secure Data Retrieval.

  1. J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, "Maxprop: Routing for vehicle-based disruption tolerant networks," in Proc.IEEE INFOCOM, 2006, pp. 1–11.
  2. M. Chuah and P. Yang, "Node density-based adaptive routing scheme for disruption tolerant networks," in Proc. IEEE MILCOM, 2006, pp. 1–6.
  3. M. M. B. Tariq, M. Ammar, and E. Zequra, "Mesage ferry route design for sparse ad hoc networks with mobile nodes," in Proc. ACM MobiHoc, 2006, pp. 37–48.
  4. S. Roy andM. Chuah, "Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs," Lehigh CSE Tech. Rep., 2009.
  5. M. Chuah and P. Yang, "Performance evaluation of content-based information retrieval schemes for DTNs," in Proc. IEEE MILCOM, 2007, pp. 1–7.
  6. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu,"Plutus: Scalable secure file sharing on untrusted storage," in Proc. Conf. File Storage Technol., 2003, pp. 29–42. Conf. File Storage Technol., 2003, pp. 29–42.
  7. L. Ibraimi, M. Petkovic, S. Nikova, P . Hartel, and W. Jonker, "Mediated ciphertext-policy attribute -based encryption and its application," in Proc. WISA, 2009, LNCS 5932, pp. 3 09–323.
  8. N. Chen, M. Gerla, D. Huang, and X. Hon g, "Secure, selective             group broadcast in vehicular networks us ing dynamic attribute based encryption," in Proc. Ad Hoc Netw. Worksho p, 2010, pp. 1–8.
  9. D.HuangandM.Verma,"ASPE:Attrib ute-based secure policy enforcement in vehicular ad hoc net works," Ad Hoc Netw., vol. 7
  10. A. Lewko and B. Waters, "Decentra lizing attribute-based encryption," Cryptology ePrint Archive: Rep. 2010/351, 2010.
  11. A. Sahai and B. Waters, "Fuzzy ide ntity-based encryption," in Proc. Eurocrypt, 2005, pp. 457–473.
  12. V.Goyal,O.Pandey,A.Sahai,andB . Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Comput. Commun. Securi ty, 2006, pp. 89–98.
  13. J. Bethencourt, A. Sahai, and B . Waters, "Ciphertext-policy attributebased encryption," in Proc. IE EE Symp. Security Privacy, 2007, pp. 321–334.

Publication Details

Published in : Volume 3 | Issue 2 | January-February 2017
Date of Publication : 2017-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 132-135
Manuscript Number : NCAEAS2331
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Prof. Devika Deshmukh, Aditi Zade, Dhanashri Jumade, Sharvari Katyayan, Neha Thakare, Harshada Shende, " Secure Data Key Retrieval for Decentralized Disruption Tolerant Military Networks, International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 3, Issue 2, pp.132-135, January-February-2017. Available at doi : 10.32628/NCAEAS2331
Journal URL : http://ijsrst.com/NCAEAS2331

Article Preview

Follow Us

Contact Us