SECURED DATA RETRIEVAL IN MILITARY APPLICATIONS USING CP-ABE

Authors

  • Persi Pamela I M.Tech, Assistant Professor, Department of Information Technology, Kingston engineering College, Vellore, Tamil Nadu, India,
  • Ms. Moneeca. R Final year B.Tech (IT) student, Kingston engineering College, Vellore, Tamil Nadu, India,
  • Ms. Gladys Persia Christiana.S Final year B.Tech (IT) student, Kingston engineering College, Vellore, Tamil Nadu, India,

DOI:

https://doi.org/10.53555/ephijse.v7i3.191

Keywords:

Disruption-tolerant network (DTN), Ciphertext-policy attribute-based encryption (CP-ABE), secure data retrieval

Abstract

Disruption-tolerant network (DTN) technologies are only solutions for military environment because of their mobile nodes irregular network connectivity and frequent partitions. But due to its nature of having external storage node during the transmission there is chance of getting exploited. Cipher text-policy attribute-based encryption(CP-ABE), is a good solution however, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities.Some users (receivers) may change their associated attributes at some point (for example moving their region) here there is a need of attribute updation and also provides forward and backward secrecy for the attribute revocation problem. So we proposed a system that provides a multi authority CP-ABE scheme for secure data retrieval in decentralized DTNs a variation of the CP-ABE algorithm that overcomes the attribute revocation problem.

References

. D. Huang and M. Verma, “ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,” Ad Hoc Netw., vol. 7, no. 8,pp. 1526–1535, 2009.

. M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya, “P-signatures and noninteractive anonymous credentials,” in Proc. TCC, 2008, LNCS 4948, pp. 356–374.

. A. Lewko and B. Waters, “Decentralizing attribute-based encryption”Cryptology ePrint Archive: Rep. 2010/351, 2010.

. R. Ostrovsky, A. Sahai, and B. Waters, " SECURE ATC SURVEILLANCE FOR MILITARY APPLICATIONS,” in Proc. ACM Conf. Comput.Commun. Security, 2007, pp. 195–203.

. L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 456–465.

. M. Chase, “Multi-authority attribute based encryption,” in Proc. TCC, 2007, LNCS 4329, pp. 515-534.

. X. Liang, Z. Cao, H. Lin, and D.Xing,“Provably secure and efficient bounded ciphertext policy attribute based encryption,” in Proc. ASIACCS,2009, pp. 343–352.

. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proc. ASIACCS, 2010, pp. 261–270.

. S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009.

. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertextpolicy attribute-based encryption and its application,”in Proc. WISA, 2009, LNCS 5932, pp. 309–323.

. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp. 321–334.

. M. Chase and S. S. M. Chow, “Improving privacy and security inmultiauthority attribute-based encryption,” in Proc. ACM Conf. Comput. Commun. Security, 2009, pp. 121– 130.

. M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.

. N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,” in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.

. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for finegrained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.

. A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proc. ACM Conf. Comput. Commun. Security, 2008, pp. 417–426.

Downloads

Published

2021-09-27