Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Key Management Using CP-ABE For Secure Group Communication

Author : C.Vishal 1 V.Sujananth 2 T.TamilSelvan 3 K.Rejini 4

Date of Publication :7th March 2015

Abstract: Theconfidentiality is prominent in military environment and large scale network. Ciphertext-policy attributebased encryption (CP-ABE) is a solution to the access control issues. Disruption-tolerant network (DTN) technologies are solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. But, introducing CP-ABE in DTN may cause some security issues. Most challenging issues are the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs whereimmediate attribute revocation enhances backward/forward secrecy of confidential data by reducing the windows of vulnerability. This mechanism helps to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network

Reference :

    1. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebasedencryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp.321–334..
    2. JunbeomHur and Dong Kun Noh, ―AttributeBased Access Control with Efficient Revocation in Data Outsourcing Systems‖, IEEE Transactions on Parallel and Distributed Systems, pp 1214-1221, 2011.
    3. Lewko, Allison; Sahai, Amit; Waters, Brent, ―Revocation Systems with Very Small Private Keys‖, Security and Privacy (SP), IEEE Symposium, May 2010, 978-1-4244-6895-9, pp 273 – 285, 2010.
    4. Alexandra Boldyreva, VipulGoyal, Virendra Kumar, ―Identity-based encryption with efficient revocation‖, Proceedings of the 15th ACM conference on Computer and communications security, ISBN: 978- 1-59593-810-7, pp 417-426, 2008
    5. Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou, ―Attribute based data sharing with attribute revocation‖, Proceedings of the 5th ACM Symposium on Information, ISBN: 978-1-60558-936-7, pp 261-270, 2010. .
    6. N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective groupbroadcast in vehicular networks using dynamic attribute based encryption,” inProc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.
    7. S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policyattribute-based encryption (CPABE) system for the DTNs,” LehighCSE Tech. Rep., 2009
    8. S. S.M. Chow, “Removing escrow from identitybased encryption,” in Proc. PKC, 2009, LNCS 5443, pp. 256–276.
    9. M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya, “P-signatures andnoninteractive anonymous credentials,” in Proc. TCC, 2008, LNCS 4948, pp. 356–3747

Recent Article