Privacy Oriented Data Fetching for Disruption Tolerant Military Networks
Keywords:
Secure Data Retrieval, Disruption-tolerant network's, multi-authority, Q-Tree, Multi-Attribute Based Range Query.Abstract
Military faces a number of challenges in handling classified and unclassified information. Major challenges include the money, time and effort it takes to develop and deploy new devices or networks and finally integrating them with the existing infrastructure cohesively currently in use and not readily replaceable. To meet military needs for securing data storage with respect to the new state of the art Disruption-tolerant network's (DTN) that allows DTN nodes carried by soldiers to communicate with each other and access and share private information even in the event of network delays. However, security breach is a major concern in such DTN's. Although an attribute based encryption scheme is found viable in such store and forward networks, the latency issues with respect to key generation and maintenance is quite complex when using the traditional list based structures. Therefore, we propose a new optimized solution to improve to attribute extraction process of data and sort, revalidate and formulate a key generation process that can reduce the latencies involved and store and forwarding process of DTN's. A real time network application developed in this regard highlights our proposed claim and its efficiency.
References
- Junbeom Hur and Kyungtae Kang, “Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks”, proceedings in IEEE TRANSACTIONS ON NETWORKING VOL:22 NO:1 YEAR 2014.
- S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proc. ASIACCS, 2010, pp. 261–270.
- A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proc. ACM Conf. Comput. Commun. Security, 2008, pp. 417–426.
- M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attributebased systems,” in Proc. ACMConf. Comput. Commun. Security, 2006, pp. 99–112.
- L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323.
- N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,” in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.
- D. Huang and M. Verma, “ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,” Ad Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009.
- A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” Cryptology ePrint Archive: Rep. 2010/351, 2010.
- Md Ahsan Arefin, Md Yusuf Sarwar Uddin, Indranil Gupta, Klara Nahrstedt, “Q-Tree: A Multi-Attribute Based Range Query Solution for Tele-Immersive Framework”, in Proc. of ACM SIGCOMM, 2009, pp. 379–390.
- S. Ko, S. Yalagandula, I. Gupta, V. Talwar, D. Milojicic, and S. Iyer, “Moara: Flexible and scalable group-based querying system,” in Proc. of ACM/IFIP/USENIX Middleware, 2008.
- S.Saranya , B.Suganya Devi, “A Novel Access Control Mechanism to Secure the Data Dissemination in the Disruption Tolerant Network”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 2, February 2015,pp.1151-1156.
- Z. Yang, Y. Cui, B. Yu, J. Liang, K. Nahrsterdt, S. H. Jung, and R. Bajscy, “Teeve: The next generation architecture for tele-immersive environments,” in Proc. of ISM, Irvine, CA, USA, 2005, pp. 112–119.
- M. Arefin, M. Uddin, I. Gupta, and K. Nahrstedt, “Q-tree: A multi-attribute rnage based query solution for tele-immersive framework,” in Technical Report, UIUCDCS-R-2009-3042, UIUC, 2009.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.