Privacy Oriented Data Fetching for Disruption Tolerant Military Networks

Authors

  • K. Sobha Rani  Computer Science Department, VR Siddhartha College, Student, Vijayawada, India
  • P. Raveendra Babu  Computer Science Department, VR Siddhartha College, Assistant Professor, Vijayawada, India

Keywords:

Secure Data Retrieval, Disruption-tolerant network's, multi-authority, Q-Tree, Multi-Attribute Based Range Query.

Abstract

Military faces a number of challenges in handling classified and unclassified information. Major challenges include the money, time and effort it takes to develop and deploy new devices or networks and finally integrating them with the existing infrastructure cohesively currently in use and not readily replaceable. To meet military needs for securing data storage with respect to the new state of the art Disruption-tolerant network's (DTN) that allows DTN nodes carried by soldiers to communicate with each other and access and share private information even in the event of network delays. However, security breach is a major concern in such DTN's. Although an attribute based encryption scheme is found viable in such store and forward networks, the latency issues with respect to key generation and maintenance is quite complex when using the traditional list based structures. Therefore, we propose a new optimized solution to improve to attribute extraction process of data and sort, revalidate and formulate a key generation process that can reduce the latencies involved and store and forwarding process of DTN's. A real time network application developed in this regard highlights our proposed claim and its efficiency.

References

  1. Junbeom Hur and Kyungtae Kang, “Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks”, proceedings in IEEE TRANSACTIONS ON NETWORKING VOL:22 NO:1 YEAR 2014.
  2. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proc. ASIACCS, 2010, pp. 261–270.
  3. A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proc. ACM Conf. Comput. Commun. Security, 2008, pp. 417–426.
  4.  M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attributebased systems,” in Proc. ACMConf. Comput. Commun. Security, 2006, pp. 99–112.
  5.  L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323.
  6.  N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,” in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.
  7. D. Huang and M. Verma, “ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,” Ad Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009.
  8.  A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” Cryptology ePrint Archive: Rep. 2010/351, 2010.
  9. Md Ahsan Arefin, Md Yusuf Sarwar Uddin, Indranil Gupta, Klara Nahrstedt, “Q-Tree: A Multi-Attribute Based Range Query Solution for Tele-Immersive Framework”, in Proc. of ACM SIGCOMM, 2009, pp. 379–390.
  10.  S. Ko, S. Yalagandula, I. Gupta, V. Talwar, D. Milojicic, and S. Iyer, “Moara: Flexible and scalable group-based querying system,” in Proc. of ACM/IFIP/USENIX Middleware, 2008.
  11.  S.Saranya , B.Suganya Devi, “A Novel Access Control Mechanism to Secure the Data Dissemination in the Disruption Tolerant Network”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 2, February 2015,pp.1151-1156.
  12.  Z. Yang, Y. Cui, B. Yu, J. Liang, K. Nahrsterdt, S. H. Jung, and R. Bajscy, “Teeve: The next generation architecture for tele-immersive environments,” in Proc. of ISM, Irvine, CA, USA, 2005, pp. 112–119.
  13.  M. Arefin, M. Uddin, I. Gupta, and K. Nahrstedt, “Q-tree: A multi-attribute rnage based query solution for tele-immersive framework,” in Technical Report, UIUCDCS-R-2009-3042, UIUC, 2009.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
K. Sobha Rani, P. Raveendra Babu, " Privacy Oriented Data Fetching for Disruption Tolerant Military Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.502-507, September-October-2017.