Mobile nodes in military environments such as a
battlefield or a hostile region are likely to suffer from
intermittent network connectivity and frequent partitions.
Disruption-tolerant networks (DTN) technologies are
emerging to become most successful solutions which allows
the wireless devices to be carried by the soldier in-order to
make communication with each other and access the
information that are confidential or commands are made
reliable by exploiting the external storage nodes. There are
some of the most challenging issues present in this scenario,
they are enforcement of authorization policy and policies that
are updated for processing the data retrieval in a secure
manner. Cipher text policy attribute-based encryption (CPABE)
is a significant solution for cryptography in-order to
access the control issues. The problem of implementing the
CP-ABE is a de-centralized DTNs origins many security and
privacy challenges regarding to attribute revocation key
escrow, and co-ordinates of attributes given from different
authorities. In this paper, we propose a secure scheme for
retrieval of data using CP-ABE for de-centralized DTNs
where the authorities of multiple key look after their attribute
independently. We illustrate how to apply the proposed
system to manage the confidential data with security and
efficiency, distributed in the Disruption-tolerant military
networks.
Shanmugasundaram. S : M. Tech. Student, Department of Computer Science and Engineering
Manakula Vinayagar Institute of Technology,
Pondicherry University, Pondicherry.
Chitra. S : Assistant Professor, Department of Information Technology
Manakula Vinayagar Institute of Technology
Pondicherry University, Pondicherry.
Lokesh. V : M. Tech. Student, Department of Computer Science and Engineering
Manakula Vinayagar Institute of Technology,
Pondicherry University, Pondicherry.
DTN
CP-ABE
Cipher Text
Attributes
The DTN techniques are emerging to be the most
effective solution in military applications that let the
wireless devices to interact with each other and access
the confidentially secure information consistently by
exploiting the external storage nodes. CP-ABE is an
ascendable cryptographic solution to the access control
and retrieval of secure data issues. In this paper, we
proposed an well-organized and secure data retrieval
method using CP-ABE for decentralized DTNs where
the attributes are autonomously managed by multiple
key authorities. The characteristic key escrow problem
is determined, such that the security of the stored data is
guaranteed even in the hostile environment where the
key authorities may be compromised or untrusted. The
revocation for fine-grained key can also be done for
each attribute group in addition. We elucidate how to
apply the proposed system in order to manage the
confidential data distributed in disruption-tolerance
military network in a secured and efficient manner.
[1] JunbeomHur and Kyungtae Kang, Member, IEEE,
ACM “Secure Data Retrieval for Decentralized
Disruption-Tolerant Military Networks”-IEEE/ACM
TRANSACTIONS ON NETWORKING, VOL. 22,
NO. 1, FEBRUARY 2014.
[2] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine,
“Maxprop: Routing for vehicle-based disruption
tolerant networks,” in Proc. IEEE INFOCOM, 2006,
pp. 1–11.
[3] M. Chuah and P.Yang,“Node density-based adaptive
routing scheme for disruption tolerant networks,” in
Proc. IEEE MILCOM, 2006, pp. 1–6.
[4] M. M. B. Tariq, M. Ammar, and E. Zequra, “Message
ferry route de- sign for sparse ad hoc networks with
mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37–
48.
[5] S.Royand,Chuah,“Secure data retrieval based on
cipher text policy attribute-based encryption (CPABE)
system for the DTNs,” Lehigh CSE Tech. Rep.,
2009.
[6] M. Chuah and P. Yang, “Performance evaluation of
content-based information retrieval schemes for
DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.
[7] A.LewkoandB.Waters,“Decentralizing attribute-based
encryption,” Cryptology ePrint Archive: Rep.
2010/351, 2010. [8] A. Sahai and B. Waters, “Fuzzy identity-based
encryption,” in Proc. Eurocrypt, 2005, pp. 457–473.
[9] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
“Attribute-based encryption for fine-grained access
control of encrypted data,” in Proc. ACM
Conf.Comput.Commun.Security,2006,pp.89–98.
[10] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertextpolicy
attribute- based encryption,” in Proc. IEEE
Symp. Security Privacy, 2007, pp. 321–334.
[11] R. Ostrovsky, A. Sahai, and B. Waters, “Attributebased
encryption with non-monotonic access
structures,” in Proc. ACM Conf. Comput. Commun.
Security, 2007, pp. 195–203.
[12] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute
based data sharing withattributerevocation,”in
Proc.ASIACCS,2010,pp.261–270.
[13] A.Boldyreva,V.Goyal,andV.Kumar,“Identity-based
encryption with efficient revocation,”in Proc.ACM
Conf.Comput.Commun. Security, 2008, pp. 417–426.
[14] RafaeliandD.Hutchison,“A survey of key management
for secure group communication,” Comput. Surv., vol.
35, no. 3, pp. 309–329, 2003