Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing nvironment has been recognized as an imperative equirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted nformation-sharing approach for government departments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of onfidential and top secret information amongst security ersonnels and government departments within the national oundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and overnment intelligence departments to avoid threatening activities. The experimental results demonstrate the ffectiveness of the proposed information sharing approach.

Authors and Affiliations

Md. Headayetullah , G. K. Pradhan

Keywords

Related Articles

IMPROVED PART IDENTIFICATION AND REQUISITION USING 3D ILLUSTRATED PARTS CATALOGUES IN AEROSPACE AND DEFENSE

Part identification and requisition is being carried out in aerospace and defense using Illustrated Parts Catalogues that are in hardcopy format. This paper introduces the concept of 3D Illustrated Parts Catalogues, whic...

Road Recognition for Vision Navigation of Robot by Using Computer Vision

This paper presents a method for vision navigation of robot by road recognition based on image processing. By taking advantages of the unique structure in road images, the square images on road can be scanned while the r...

A Study of Image Segmentation and Edge Detection Techniques

Image segmentation is the key behind image understanding. Image segmentation is one of the most important steps leading to the analysis of processed image data. It is the prime area of research in computer vision. A numb...

Optimization Technique for Maximization Problem in Evolutionary Programming of Genetic Algorithm in Data Mining

The optimization technique is used for the identification of some best values from the various populations. The Evolutionary algorithm is used as a basic concept of the Evolutionary Programming Strategy. To solve many of...

Improved Ant Colony Optimization Algorithm based Expert System on Nephrology

Expert system Nephrology is a computer program that exhibits, within a specific domain, a degree of expertise in problem olving that is comparable to that of a human expert. The knowledge base consists of information ab...

Download PDF file
  • EP ID EP85404
  • DOI -
  • Views 188
  • Downloads 0

How To Cite

Md. Headayetullah, G. K. Pradhan (2010). Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach. International Journal on Computer Science and Engineering, 2(4), 1254-1265. https://www.europub.co.uk/articles/-A-85404