Abstract
The current Internet service models is based on a few assumptions such as the existence of an end to end path between a source and destination pair, and low round-trip latency between any node pair. However, these assumptions do not hold in some emerging networks. Like battlefield ad-hocNetworks in which wireless devices carried by soldiers operate in hostile environments where jamming, environmental factors and mobility may cause temporary disconnections. To allow nodes to communicate with each other in these extreme networking environments, we proposed a new architecture called the Disruption Tolerant Network (DTN). In some application scenarios, there are some 'storage nodes' in the network where useful data is stored or replicated so that other regular mobile nodes can access the necessary information quickly and efficiently. A requirement in some security-critical applications is to design an access control system to protect the confidential data stored in the storage nodes or contents of the confidential messages routed through the network. Overcome this problem, in this project we propose a cipher text-policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the cipher text. Thus, different users are allowed to decrypt different pieces of data per the security policy. The proposed scheme have attribute revocation enhances backward/forward secrecy of confidential data; the coordination of attributes issued from different authorities and avoid third party compromised with key authorities. The proposed scheme to securely and efficiently manage the confidential data distributed in the disruption- tolerant military network.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.