Open Access Open Access  Restricted Access Subscription Access

An Efficient Scheme for Facilitating Secure Data Sharing in Decentralized Disruption Tolerant Networks


Affiliations
1 Department of Electronics and Computer Engineering, K L University, Vaddeswaram, Guntur District - 522502, Andhra Pradesh, India
 

Wireless Sensor Nodes in military situations, for example, a war zone or an unfriendly locale are liable to experience the ill effects of discontinuous system network. Objective: To design an efficient data recovery scheme for Decentralized DTNs in military environments, based on CP-ABE methodology, making Security the utmost prioritized characteristic. Analysis: Latest Innovations in Disruption Tolerant Networks (DTN) are getting to be effective arrangements, that permit mobile devices carried by military personnel to correspond with one another and access the classified data or to command effectively by manipulating the independent-autonomous repository nodes. Out of these, the most difficult issues in the situation are the authorization strategies and those approaches' improvisation for secure data recovery. Methodology: Cipher text Policy-Attribute Based Encryption (CP-ABE) is a promising cryptographic technique to address the access authority issues. The issue of applying CP-ABE in decentralized DTNs presents a few security and protection challenges like attribute revoke, key security, and regulation of attributes issued from distinct authorities. So, we implement CP-ABE along with 2PC (Two Phase Commit) protocol and where numerous key authorities deal with their attributes autonomously to overcome the above mentioned challenges. Findings/Improvements: We implement the proposed System as a stand-alone application in Eclipse IDE. We've been successful in implementing this system to achieve the security requirements we've been discussing at length in the paper and we've demonstrated how to recover the data in very hostile military environments in an efficient and a secured manner.

Keywords

Attribute Based Encryption, Collusion Protection, Data Confidentiality, Decentralized Key Authorities, Disruption Tolerant Networks, Forward and Backward Secrecy, Military Networks, Privileged Access Permissions, Secured Data Sharing, Wireless Sensor Networks
User

Abstract Views: 217

PDF Views: 0




  • An Efficient Scheme for Facilitating Secure Data Sharing in Decentralized Disruption Tolerant Networks

Abstract Views: 217  |  PDF Views: 0

Authors

M. S. Sarath Chandra
Department of Electronics and Computer Engineering, K L University, Vaddeswaram, Guntur District - 522502, Andhra Pradesh, India
K. Raghava Rao
Department of Electronics and Computer Engineering, K L University, Vaddeswaram, Guntur District - 522502, Andhra Pradesh, India
Mohammed Ali Hussain
Department of Electronics and Computer Engineering, K L University, Vaddeswaram, Guntur District - 522502, Andhra Pradesh, India

Abstract


Wireless Sensor Nodes in military situations, for example, a war zone or an unfriendly locale are liable to experience the ill effects of discontinuous system network. Objective: To design an efficient data recovery scheme for Decentralized DTNs in military environments, based on CP-ABE methodology, making Security the utmost prioritized characteristic. Analysis: Latest Innovations in Disruption Tolerant Networks (DTN) are getting to be effective arrangements, that permit mobile devices carried by military personnel to correspond with one another and access the classified data or to command effectively by manipulating the independent-autonomous repository nodes. Out of these, the most difficult issues in the situation are the authorization strategies and those approaches' improvisation for secure data recovery. Methodology: Cipher text Policy-Attribute Based Encryption (CP-ABE) is a promising cryptographic technique to address the access authority issues. The issue of applying CP-ABE in decentralized DTNs presents a few security and protection challenges like attribute revoke, key security, and regulation of attributes issued from distinct authorities. So, we implement CP-ABE along with 2PC (Two Phase Commit) protocol and where numerous key authorities deal with their attributes autonomously to overcome the above mentioned challenges. Findings/Improvements: We implement the proposed System as a stand-alone application in Eclipse IDE. We've been successful in implementing this system to achieve the security requirements we've been discussing at length in the paper and we've demonstrated how to recover the data in very hostile military environments in an efficient and a secured manner.

Keywords


Attribute Based Encryption, Collusion Protection, Data Confidentiality, Decentralized Key Authorities, Disruption Tolerant Networks, Forward and Backward Secrecy, Military Networks, Privileged Access Permissions, Secured Data Sharing, Wireless Sensor Networks



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i5%2F130632