Author : Neha Patil 1
Date of Publication :7th February 2017
Abstract: Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Cipher text attribute with encryption is a cryptographic solution to the access issues. However, the problem of applying in decentralized DTNs apply several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities., To propose a secure data retrieval scheme using IDEA for decentralized DTNs where many key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.
Reference :
-
- M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc. Conf. File Storage Technol., 2003, pp. 29–42.
- A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Eurocrypt, 2005, pp. 457–473.
- J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: outing for vehicle-based disruption tolerant networks,” in Proc.IEEE INFOCOM, 2006, pp. 1–11.
- M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp.1, 6.
- M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37– 48.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
- M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.
- J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased Encryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp.321–334.
- R. Ostrovsky, A. Sahai, and B. Waters, “Attributebased encryption with non-monotonic access structures,” in Proc. ACM Conf. Comput.Commun. Security, 2007, pp. 195–203.
- S. Roy and M. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption () system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
- A. Lewko and B. Waters, “Decentralizing attributebased encryption,” Cryptology ePrint Archive: Rep. 2010/351, 2010.
- S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proc. ASIACCS, 2010, pp. 261–270.
- Junbeom Hur and Kyungtae Kang, “Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks” IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014.
- A. Boldyreva, V. Goyal, and V. Kumar, “Identitybased encryption with efficient revocation,” in Proc. ACM Conf. Comput. Commun. Security