SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
Secure Data Sharing Algorithm for Data Retrieval In
Military Based Networks
A.Lilly sara
Arunai Engineering College,
CSE(with specialization in Networks)
Lillysara2401@gmail.com
E.Elavarasi
Assistant Professor,
Arunai Engineering College,
Department of CSE
Elavarasi17@gmail.com
Abstract— Mobile knots now armed atmospheres such equally battlefield or aggressive area remain expected toward smart after
irregular net connectivity and regular panels. Disruption Tolerant Network (DTN) tools stay attractive positive keys that agree knots
toward connect with each other in these dangerous interacting atmospheres.The problem of applying the security mechanisms to DTN
introduces several security challenges.Since nearly handlers could modification their related characteristics by approximately
argument and reliability of data should be changed otherwise around isolated secrets power remain bargained significant reversal
aimed at respectively characteristic is essential in command toward create organisms safe in this research a novel approaches are used
to overcome the above mentioned problems called secure data sharing algorithm. This algorithm calculate hash importance aimed at
coded documents which is used to check the reliability of encrypted confidential data.
Index Terms— Disruption tolerant network ,Secure data sharing algorithm,Cipher text attribute based encryption,Secure hash
function,Key policy attribute based encryption.
——————————  ——————————
1 INTRODUCTION
When developing secure network the following need to be consider.
1. Access – authorized users are provided the means to communicate
to and from a particular network.
2. Confidentiality – Information in the network remains private.
3. Authentication – Ensure the users of the network are who they say
they are.
4. Integrity – Ensure the message has not been modified in transit.
5. Non‐repudiation – Ensure the user does not refute that he used the
network an effective network security plan is developed.
In this system, a novel approach is used to secure data retrieval in
military environments called Secure Data Sharing Approach. In
SDSA, once users retrieve a data using his private key he/she must
perform the hash function computation for verify the reliability of
shared confidential data. It computes hash function during both the
data encryption and decryption. Then, Compare the generated hash
values, if it is similar then the received data should be considered as
reliable else the received data considered as not reliable.Details
about the wireless network. Initially the network contains network
servers, multiple Attribute authority and users. The network server is
connected with commander (Sender), Key authorities (central
authority and multiple local authorities). Here the Commander
directly handles the data. The Key authorities is used for provide
secret key to the requested group of soldier and Commander.
Initially the commander and user makes register by entering the
required details and login to the wireless network. Once a user
retrieve a data using his private key he/she must perform the hash
function computation for verify the reliability of shared confidential
data. This secure data sharing approach computes hash function
during both the data encryption and decryption. Compare the
IJTET©2015
generated hash values, if it is similar then the received data should be
considered as reliable else the received data considered as not
reliable
Fig.1:System protection
The SDS Algorithm computes hash function during both the data
encryption and decryption. Then, Compare the generated hash
values, if it is similar then the received data should be considered as
reliable else the received data considered as not reliable. Our
proposed research work implements secure data retrieval for military
environments using Secure Data Sharing Approach and Cipher text
policy-Attribute based Encryption. By allowing ,the secure data
retrieval perform by secure data sharing algorithm which comes
47
Equanet
security
strategy
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
under SHA(secure hash algorithm)to retrieve the data for users from
data owner should be securely. By using SDS algorithm they Provide
Confidentiality ,Provide Data Reliability,Provide Secured
Communication.
2. RELATED WORK
Melissa Chase, Sherman S.M. CHOW [1] In many applications we
find we need to share data according to an encryption policy without
prior knowledge of who will be receiving the data. To propose a
Multi-Authority Attribute-Based Encryption (ABE) system.
Shucheng Yu, Cong Wang, Kui Ren[2] Cipher text will specify
an access policy over attributes. To overcome this difficulty, we
introduce many ―copies‖ of each attribute for every position in the
access structure tree where it can occur. However, since the actual
access structure to be used for a particular cipher text must be
embedded into the fixed ―universal‖ tree access structure in the KP-
ABE scheme, these causes a blowup in cipher text size.
Allison Lewko, Brent water[3] In many applications we find
we need to share data according to an encryption policy without
prior knowledge of who will be receiving the data. To propose a
Multi-Authority Attribute-Based Encryption (ABE) system.
Luan Ibraimi, Milan Petkovic,Svetla Nikova, Pieter Hartel,
Willem Jonker[4]
To supports revocation of user attributes. If an attribute is
revoked, the user cannot use it in the decryption phase. The scheme
allows the encryptor to encrypt a message according to an access
policy over a set of at- tributes, and only users who satisfy the access
policy and whose attributes are not revoked can decrypt the
ciphertext. A possible extension to this research would be to provide
a scheme which would have a security proof under standard
complexity assumptions.
Vipul Goyal, Abhishek Jain, Omkant Pandey, and Amit Sahai[5]
Encrypted cipher text will specify an access policy over attributes.
To overcome this difficulty, we introduce many ―copies‖ of each
attribute for every position in the access structure tree where it can
occur. However, since the actual access structure to be used for a
particular cipher text must be embedded into the fixed ―universal‖
tree access structure in the KP-ABE scheme, these causes a blowup
in cipher text size.
Sherman S.M. Chow[6] Key escrow is inherent.A curious Key
Generation Center can only create the user’s private key to decrypt a
cipher text. However can a still decrypt if it does not know the
intended recipient of the cipher text we answer by formalizing
anonymous cipher text in distinguishability.
3.PROPOSED ALGORITHM
In our proposed system, a novel approach is used to secure data
retrieval in military environments called Secure Data Sharing
Approach. In SDSA, once users retrieve a data using his private key
he/she must perform the hash function computation for verify the
reliability of shared confidential data. It computes hash function
during both the data encryption and decryption. Then, Compare the
IJTET©2015
generated hash values, if it is similar then the received data should
be considered as reliable else the received data considered as not
reliable.
In Proposed system, the CP ABE used for secure data retrieval in
military networks. In CP-ABE, the cipher text is encoded by an
entrée strategy selected in an encryptor, then a important is only
formed by detail towards an characteristics established. CP-ABE
allows encryptor such by means of a commander-in-chief towards
select an entrée rule scheduled characteristics then towards encode
private documents below the entrée assembly through encoding by
the consistent community secrets otherwise characteristics.
Signature Data Sharing Approach
Step 1: Randomly picks a prime number p.
Step 2: Compute Hash value (H) for prime number p.
Step 3: Store the hash value in encrypted data.
Step 4: If any unauthorized person/ attacker access the confidential
encrypted data the hash value should perform either addition or
multiplication operation.
Step 5: Receiver receives it private key, then it compute hash
function using its private key
Step 6: The computed hash value as same as generate hash value
hence it is original data.
Step 7: Based on step 4, any unauthorized person or attacker
accessed the data, and then computed hash value should be
mismatched hence the receiver identifies the received data is not an
original data.
Step 8: So, receiver neglect the retrieved data.
EXISTING SYSTEM:
In existing system, KP-ABE scheme was used to solve the key
escrow problem in a multi-authority system. In this method, entirely
(split) characteristic establishments remain joining now the
important group procedure now a scattered method such that they
dismiss group their informations then connection several
characteristic groups going towards the similar handler.
In KP-ABE, the encryptor simply develops towards make a
ciphertext through a regular of characteristics. The important
specialist selects a rule aimed at separately handler that defines
which ciphertexts he dismiss decrypt then problems the important
towards respectively handler through surrounding the rule addicted
to the handler’s important. Then around no centralized authority with
master secret information, all attribute authorities should
communicate with each other in the system to generate a user’s
secret key.There is no separate algorithm for transmitting/receiving
the confidential data.Complexity is very high.Reliability of
Confidential data is very low.
MODULES
Execution is the phase of the task after the theoretic task is rotated
available addicted to a occupied method.
1.Network Deployment module
2.Data encryption module
3.Key distribution module
4.Data retrieval module
48
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
4.SYSTEM DESIGN
commander,encrypt data using SDS
data owner,data storage
key authorities,users key authority
encrypt data with hash CP- ABE
users
Fig.2. Architetcure Diagram.
4.1.Network deployment module:
This module contains the details about the wireless network. Initially
the network contains network servers, multiple Attribute authority
and users. The network server is connected with commander
(Sender), Key authorities (central authority and multiple local
authorities). Here the Commander directly handles the data. The Key
authorities is used for provide secret key to the requested group of
soldier and Commander. Initially the commander and user makes
register by entering the required details and login to the wireless
network.
4.2Data encryption module:
This module provides the details about data encryption.
Sender is an object who preserves personal communications
otherwise documents (e.g., a commander-in-chief) then needs
towards supply them addicted to the exterior documents storing knot
aimed at simplicity of involvement otherwise aimed at consistent
distribution towards handlers in the exciting make contacts
surroundings. A source is answerable aimed at important
(characteristic established) admission rule then applying it on that
one individual documents by encoding the documents below the rule
earlier storage the situation towards the storing knot. The
commander (sender) encrypts the data.Then hash value for encrypted
data using secure data sharing approach which is used to check the
reliability of encrypted confidential data.
IJTET©2015
4.3.Key distribution module:
In this module, Cipher text policy- Attribute Based Encryption (CP-
ABE) algorithm is used to generate the key for encrypted data that
should be generated by sender. The Cipher text Policy –Attribute
Based Encryption(CP-ABE) offers a accessible technique of
encoding documents such that the encryptor describes the
characteristic established that the decryptor wants towards have
popular directive to decrypt the cryptograph script. Hence, changed
handlers remain acceptable towards decrypt changed parts of
documents each the safety rule.
4.4.Data retrieval module:
In this module, the user retrieves the shared data. User is a portable
knot who needs towards entree the informations deposited on the
storing knot (e.g., a warrior). Unknown handler keeps established of
characteristics sufficient the entree rule of the encoded documents
well-defined through the source, then is not canceled popular one of
the characteristics, before he determination remain capable towards
decrypt the cryptograph script then get the documents. Once a user
retrieve a data using his private key he/she must perform the hash
function computation for verify the reliability of shared confidential
data. This secure data sharing approach computes hash function
during both the data encryption and decryption. Compare the
generated hash values, if it is similar then the received data should be
considered as reliable else the received data considered as not
reliable.
49
NETWORK
DEPLOYMENT
DATA
ENCRYPTION
DATA
STORAGE
KEY
DISTRIBUTION
DATA RETRIEVAL
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
5.DISCUSSION
Our proposed research work implements secure data retrieval for
military environments using Secure Data Sharing Approach and
Cipher text policy-Attribute based Encryption. The SDS Algorithm
computes hash function during both the data encryption and
decryption. Then, Compare the generated hash values, if it is similar
then the received data should be considered as reliable else the
received data considered as not reliable.. Finally our proposed
system achieves efficient and secure data retrieval in military
networks it also provides data reliability.
6.RESULTS
By allowing ,the secure data retrieval perform by secure data sharing
algorithm which comes under SHA(secure hash algorithm)to retrieve
the data for users from data owner should be securely.
6.1
6.2
IJTET©2015
6.3
6.4
6.5
50
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
6.6
7.CONCLUSION
To conclude of this project is Secured data retrieval in military
environment by using Secure Data Sharing Algorithm are:
1.Provide Confidentiality
2. Provide Data Reliability
3. Provide Secured Communication
The SDS Algorithm computes hash function during both the data
encryption and decryption.In CP-ABE, the ciphertext is encoded
through an entree rule selected through an encryptor then a important
is only formed through admiration towards an characteristics set. CP-
ABE allows encryptor such for example a commander-in-chief to
select an entree rule on attributes then towards encode personal
documents below the entree assembly through encoding through the
equivalent unrestricted solutions otherwise characteristics. Finally
our proposed system achieves efficient and secure data retrieval in
military networks it also provides data reliability.
IJTET©2015
REFERENCES
[1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, ―Maxprop:
Routing for vehicle-based disruption tolerant networks,‖ in Proc.
IEEE INFOCOM, 2006, pp. 1–11.
[2] M. Chuah and P. Yang, ―Node density-based adaptive routing
scheme
for disruption tolerant networks,‖ in Proc. IEEE MILCOM, 2006, pp.
1–6.
[3] M. M. B. Tariq, M. Ammar, and E. Zequra, ―Mesage ferry route
design
for sparse ad hoc networks with mobile nodes,‖ in Proc. ACM
MobiHoc, 2006, pp. 37–48.
[4] S. Roy andM. Chuah, ―Secure data retrieval based on ciphertext
policy
attribute-based encryption (CP-ABE) system for the DTNs,‖ Lehigh
CSE Tech. Rep., 2009.
[5] M. Chuah and P. Yang, ―Performance evaluation of content-based
information retrieval schemes for DTNs,‖ in Proc. IEEE MILCOM,
2007, pp. 1–7.
[6] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu,
―Plutus: Scalable secure file sharing on untrusted storage,‖ in Proc.
Conf. File Storage Technol., 2003, pp. 29–42.
[7] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker,
―Mediated
ciphertext-policy attribute-based encryption and its application,‖
in Proc. WISA, 2009, LNCS 5932, pp. 309–323.
[8] N. Chen, M. Gerla, D. Huang, and X. Hong, ―Secure, selective group
broadcast in vehicular networks using dynamic attribute based
encryption,‖
in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.
[9] D. Huang and M. Verma, ―ASPE: Attribute-based secure policy
enforcement
in vehicular ad hoc networks,‖ Ad Hoc Netw., vol. 7, no. 8,
pp. 1526–1535, 2009.
[10] A. Lewko and B. Waters, ―Decentralizing attribute-based
encryption,‖
Cryptology ePrint Archive: Rep. 2010/351, 2010.
[11] A. Sahai and B. Waters, ―Fuzzy identity-based encryption,‖ in Proc.
Eurocrypt, 2005, pp. 457–473.
[12] V. Goyal, O. Pandey, A. Sahai, and B. Waters, ―Attribute-based
encryption
for fine-grained access control of encrypted data,‖ in Proc.
ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
[13] J. Bethencourt, A. Sahai, and B. Waters, ―Ciphertext-policy
attributebased
encryption,‖ in Proc. IEEE Symp. Security Privacy, 2007, pp.
321–
51

Mais conteúdo relacionado

Mais procurados

Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
 
Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...theijes
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Pvrtechnologies Nellore
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...Nexgen Technology
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...IRJET Journal
 
Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAnkit Raj
 
Control cloud data access privilege and
Control cloud data access privilege andControl cloud data access privilege and
Control cloud data access privilege andjpstudcorner
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudAswathy Rajan
 

Mais procurados (20)

Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
 
Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
J018145862
J018145862J018145862
J018145862
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
 
Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based Encryption
 
Control cloud data access privilege and
Control cloud data access privilege andControl cloud data access privilege and
Control cloud data access privilege and
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloud
 

Semelhante a Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks

Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...IEEEFINALSEMSTUDENTSPROJECTS
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET Journal
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudIJMTST Journal
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...CloudTechnologies
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED
 
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMAM Publications
 
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
 
F018133640.key aggregate paper
F018133640.key aggregate paperF018133640.key aggregate paper
F018133640.key aggregate paperIOSR Journals
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET Journal
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...IJCERT JOURNAL
 
B04010610
B04010610B04010610
B04010610IJMER
 

Semelhante a Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks (20)

Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
Paper2
Paper2Paper2
Paper2
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
 
Ijcatr04051007
Ijcatr04051007Ijcatr04051007
Ijcatr04051007
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16
 
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
 
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
 
F018133640.key aggregate paper
F018133640.key aggregate paperF018133640.key aggregate paper
F018133640.key aggregate paper
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
 
B04010610
B04010610B04010610
B04010610
 
B04010610
B04010610B04010610
B04010610
 

Mais de IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 

Mais de IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Último

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Último (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks A.Lilly sara Arunai Engineering College, CSE(with specialization in Networks) Lillysara2401@gmail.com E.Elavarasi Assistant Professor, Arunai Engineering College, Department of CSE Elavarasi17@gmail.com Abstract— Mobile knots now armed atmospheres such equally battlefield or aggressive area remain expected toward smart after irregular net connectivity and regular panels. Disruption Tolerant Network (DTN) tools stay attractive positive keys that agree knots toward connect with each other in these dangerous interacting atmospheres.The problem of applying the security mechanisms to DTN introduces several security challenges.Since nearly handlers could modification their related characteristics by approximately argument and reliability of data should be changed otherwise around isolated secrets power remain bargained significant reversal aimed at respectively characteristic is essential in command toward create organisms safe in this research a novel approaches are used to overcome the above mentioned problems called secure data sharing algorithm. This algorithm calculate hash importance aimed at coded documents which is used to check the reliability of encrypted confidential data. Index Terms— Disruption tolerant network ,Secure data sharing algorithm,Cipher text attribute based encryption,Secure hash function,Key policy attribute based encryption. ——————————  —————————— 1 INTRODUCTION When developing secure network the following need to be consider. 1. Access – authorized users are provided the means to communicate to and from a particular network. 2. Confidentiality – Information in the network remains private. 3. Authentication – Ensure the users of the network are who they say they are. 4. Integrity – Ensure the message has not been modified in transit. 5. Non‐repudiation – Ensure the user does not refute that he used the network an effective network security plan is developed. In this system, a novel approach is used to secure data retrieval in military environments called Secure Data Sharing Approach. In SDSA, once users retrieve a data using his private key he/she must perform the hash function computation for verify the reliability of shared confidential data. It computes hash function during both the data encryption and decryption. Then, Compare the generated hash values, if it is similar then the received data should be considered as reliable else the received data considered as not reliable.Details about the wireless network. Initially the network contains network servers, multiple Attribute authority and users. The network server is connected with commander (Sender), Key authorities (central authority and multiple local authorities). Here the Commander directly handles the data. The Key authorities is used for provide secret key to the requested group of soldier and Commander. Initially the commander and user makes register by entering the required details and login to the wireless network. Once a user retrieve a data using his private key he/she must perform the hash function computation for verify the reliability of shared confidential data. This secure data sharing approach computes hash function during both the data encryption and decryption. Compare the IJTET©2015 generated hash values, if it is similar then the received data should be considered as reliable else the received data considered as not reliable Fig.1:System protection The SDS Algorithm computes hash function during both the data encryption and decryption. Then, Compare the generated hash values, if it is similar then the received data should be considered as reliable else the received data considered as not reliable. Our proposed research work implements secure data retrieval for military environments using Secure Data Sharing Approach and Cipher text policy-Attribute based Encryption. By allowing ,the secure data retrieval perform by secure data sharing algorithm which comes 47 Equanet security strategy
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 under SHA(secure hash algorithm)to retrieve the data for users from data owner should be securely. By using SDS algorithm they Provide Confidentiality ,Provide Data Reliability,Provide Secured Communication. 2. RELATED WORK Melissa Chase, Sherman S.M. CHOW [1] In many applications we find we need to share data according to an encryption policy without prior knowledge of who will be receiving the data. To propose a Multi-Authority Attribute-Based Encryption (ABE) system. Shucheng Yu, Cong Wang, Kui Ren[2] Cipher text will specify an access policy over attributes. To overcome this difficulty, we introduce many ―copies‖ of each attribute for every position in the access structure tree where it can occur. However, since the actual access structure to be used for a particular cipher text must be embedded into the fixed ―universal‖ tree access structure in the KP- ABE scheme, these causes a blowup in cipher text size. Allison Lewko, Brent water[3] In many applications we find we need to share data according to an encryption policy without prior knowledge of who will be receiving the data. To propose a Multi-Authority Attribute-Based Encryption (ABE) system. Luan Ibraimi, Milan Petkovic,Svetla Nikova, Pieter Hartel, Willem Jonker[4] To supports revocation of user attributes. If an attribute is revoked, the user cannot use it in the decryption phase. The scheme allows the encryptor to encrypt a message according to an access policy over a set of at- tributes, and only users who satisfy the access policy and whose attributes are not revoked can decrypt the ciphertext. A possible extension to this research would be to provide a scheme which would have a security proof under standard complexity assumptions. Vipul Goyal, Abhishek Jain, Omkant Pandey, and Amit Sahai[5] Encrypted cipher text will specify an access policy over attributes. To overcome this difficulty, we introduce many ―copies‖ of each attribute for every position in the access structure tree where it can occur. However, since the actual access structure to be used for a particular cipher text must be embedded into the fixed ―universal‖ tree access structure in the KP-ABE scheme, these causes a blowup in cipher text size. Sherman S.M. Chow[6] Key escrow is inherent.A curious Key Generation Center can only create the user’s private key to decrypt a cipher text. However can a still decrypt if it does not know the intended recipient of the cipher text we answer by formalizing anonymous cipher text in distinguishability. 3.PROPOSED ALGORITHM In our proposed system, a novel approach is used to secure data retrieval in military environments called Secure Data Sharing Approach. In SDSA, once users retrieve a data using his private key he/she must perform the hash function computation for verify the reliability of shared confidential data. It computes hash function during both the data encryption and decryption. Then, Compare the IJTET©2015 generated hash values, if it is similar then the received data should be considered as reliable else the received data considered as not reliable. In Proposed system, the CP ABE used for secure data retrieval in military networks. In CP-ABE, the cipher text is encoded by an entrée strategy selected in an encryptor, then a important is only formed by detail towards an characteristics established. CP-ABE allows encryptor such by means of a commander-in-chief towards select an entrée rule scheduled characteristics then towards encode private documents below the entrée assembly through encoding by the consistent community secrets otherwise characteristics. Signature Data Sharing Approach Step 1: Randomly picks a prime number p. Step 2: Compute Hash value (H) for prime number p. Step 3: Store the hash value in encrypted data. Step 4: If any unauthorized person/ attacker access the confidential encrypted data the hash value should perform either addition or multiplication operation. Step 5: Receiver receives it private key, then it compute hash function using its private key Step 6: The computed hash value as same as generate hash value hence it is original data. Step 7: Based on step 4, any unauthorized person or attacker accessed the data, and then computed hash value should be mismatched hence the receiver identifies the received data is not an original data. Step 8: So, receiver neglect the retrieved data. EXISTING SYSTEM: In existing system, KP-ABE scheme was used to solve the key escrow problem in a multi-authority system. In this method, entirely (split) characteristic establishments remain joining now the important group procedure now a scattered method such that they dismiss group their informations then connection several characteristic groups going towards the similar handler. In KP-ABE, the encryptor simply develops towards make a ciphertext through a regular of characteristics. The important specialist selects a rule aimed at separately handler that defines which ciphertexts he dismiss decrypt then problems the important towards respectively handler through surrounding the rule addicted to the handler’s important. Then around no centralized authority with master secret information, all attribute authorities should communicate with each other in the system to generate a user’s secret key.There is no separate algorithm for transmitting/receiving the confidential data.Complexity is very high.Reliability of Confidential data is very low. MODULES Execution is the phase of the task after the theoretic task is rotated available addicted to a occupied method. 1.Network Deployment module 2.Data encryption module 3.Key distribution module 4.Data retrieval module 48
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 4.SYSTEM DESIGN commander,encrypt data using SDS data owner,data storage key authorities,users key authority encrypt data with hash CP- ABE users Fig.2. Architetcure Diagram. 4.1.Network deployment module: This module contains the details about the wireless network. Initially the network contains network servers, multiple Attribute authority and users. The network server is connected with commander (Sender), Key authorities (central authority and multiple local authorities). Here the Commander directly handles the data. The Key authorities is used for provide secret key to the requested group of soldier and Commander. Initially the commander and user makes register by entering the required details and login to the wireless network. 4.2Data encryption module: This module provides the details about data encryption. Sender is an object who preserves personal communications otherwise documents (e.g., a commander-in-chief) then needs towards supply them addicted to the exterior documents storing knot aimed at simplicity of involvement otherwise aimed at consistent distribution towards handlers in the exciting make contacts surroundings. A source is answerable aimed at important (characteristic established) admission rule then applying it on that one individual documents by encoding the documents below the rule earlier storage the situation towards the storing knot. The commander (sender) encrypts the data.Then hash value for encrypted data using secure data sharing approach which is used to check the reliability of encrypted confidential data. IJTET©2015 4.3.Key distribution module: In this module, Cipher text policy- Attribute Based Encryption (CP- ABE) algorithm is used to generate the key for encrypted data that should be generated by sender. The Cipher text Policy –Attribute Based Encryption(CP-ABE) offers a accessible technique of encoding documents such that the encryptor describes the characteristic established that the decryptor wants towards have popular directive to decrypt the cryptograph script. Hence, changed handlers remain acceptable towards decrypt changed parts of documents each the safety rule. 4.4.Data retrieval module: In this module, the user retrieves the shared data. User is a portable knot who needs towards entree the informations deposited on the storing knot (e.g., a warrior). Unknown handler keeps established of characteristics sufficient the entree rule of the encoded documents well-defined through the source, then is not canceled popular one of the characteristics, before he determination remain capable towards decrypt the cryptograph script then get the documents. Once a user retrieve a data using his private key he/she must perform the hash function computation for verify the reliability of shared confidential data. This secure data sharing approach computes hash function during both the data encryption and decryption. Compare the generated hash values, if it is similar then the received data should be considered as reliable else the received data considered as not reliable. 49 NETWORK DEPLOYMENT DATA ENCRYPTION DATA STORAGE KEY DISTRIBUTION DATA RETRIEVAL
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 5.DISCUSSION Our proposed research work implements secure data retrieval for military environments using Secure Data Sharing Approach and Cipher text policy-Attribute based Encryption. The SDS Algorithm computes hash function during both the data encryption and decryption. Then, Compare the generated hash values, if it is similar then the received data should be considered as reliable else the received data considered as not reliable.. Finally our proposed system achieves efficient and secure data retrieval in military networks it also provides data reliability. 6.RESULTS By allowing ,the secure data retrieval perform by secure data sharing algorithm which comes under SHA(secure hash algorithm)to retrieve the data for users from data owner should be securely. 6.1 6.2 IJTET©2015 6.3 6.4 6.5 50
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 6.6 7.CONCLUSION To conclude of this project is Secured data retrieval in military environment by using Secure Data Sharing Algorithm are: 1.Provide Confidentiality 2. Provide Data Reliability 3. Provide Secured Communication The SDS Algorithm computes hash function during both the data encryption and decryption.In CP-ABE, the ciphertext is encoded through an entree rule selected through an encryptor then a important is only formed through admiration towards an characteristics set. CP- ABE allows encryptor such for example a commander-in-chief to select an entree rule on attributes then towards encode personal documents below the entree assembly through encoding through the equivalent unrestricted solutions otherwise characteristics. Finally our proposed system achieves efficient and secure data retrieval in military networks it also provides data reliability. IJTET©2015 REFERENCES [1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, ―Maxprop: Routing for vehicle-based disruption tolerant networks,‖ in Proc. IEEE INFOCOM, 2006, pp. 1–11. [2] M. Chuah and P. Yang, ―Node density-based adaptive routing scheme for disruption tolerant networks,‖ in Proc. IEEE MILCOM, 2006, pp. 1–6. [3] M. M. B. Tariq, M. Ammar, and E. Zequra, ―Mesage ferry route design for sparse ad hoc networks with mobile nodes,‖ in Proc. ACM MobiHoc, 2006, pp. 37–48. [4] S. Roy andM. Chuah, ―Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,‖ Lehigh CSE Tech. Rep., 2009. [5] M. Chuah and P. Yang, ―Performance evaluation of content-based information retrieval schemes for DTNs,‖ in Proc. IEEE MILCOM, 2007, pp. 1–7. [6] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, ―Plutus: Scalable secure file sharing on untrusted storage,‖ in Proc. Conf. File Storage Technol., 2003, pp. 29–42. [7] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, ―Mediated ciphertext-policy attribute-based encryption and its application,‖ in Proc. WISA, 2009, LNCS 5932, pp. 309–323. [8] N. Chen, M. Gerla, D. Huang, and X. Hong, ―Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,‖ in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8. [9] D. Huang and M. Verma, ―ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,‖ Ad Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009. [10] A. Lewko and B. Waters, ―Decentralizing attribute-based encryption,‖ Cryptology ePrint Archive: Rep. 2010/351, 2010. [11] A. Sahai and B. Waters, ―Fuzzy identity-based encryption,‖ in Proc. Eurocrypt, 2005, pp. 457–473. [12] V. Goyal, O. Pandey, A. Sahai, and B. Waters, ―Attribute-based encryption for fine-grained access control of encrypted data,‖ in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98. [13] J. Bethencourt, A. Sahai, and B. Waters, ―Ciphertext-policy attributebased encryption,‖ in Proc. IEEE Symp. Security Privacy, 2007, pp. 321– 51