SECURE CIPHER TEXT POLICY FOR MILITARY

Abstract

Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity. Disruption - tolerant network (DTN) technol ogies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information. Disruption - tolerant network (DTN) technologies are becoming successful solutions that allow nod es to communicate with each other in this extreme networking environment. The concept of attribute - based encryption (ABE) is a promising approach that fulfils the requirements for secure data retrieval in DTNs. Especially, Ciphertext - Policy ABE (CP - ABE) pr ovides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy .

Authors and Affiliations

Shazia Saleem , Raafiya Gulmeher

Keywords

Related Articles

 OPTIMUM PARTIAL REPLACEMENT OF CEMENT IN CONCRETE WITH WASTE MARBLE DUST IN CONJUNCTION WITH SUPER PLASTICIZERS

 Efforts have been made over years to make concrete production sustainable and environment friendly.Notion of new materials as substitute for the conventional materials have supported these efforts to a large e...

A REVIEW ON ENCODING AND RECONSTUCTION OF ENCRYPTED IMAGES

This paper gives a scheme of encoding of encrypted greyscale images while transmission of images for security purpose. In the encryption phase, the original pixel values are masked by a modulo-256 addition with pseudora...

 FABRICATION AND FOURIER TRANSFORM INFRARED SPECTROSCOPY STUDIES ON PVP BASED POLYMER NANOCOMPOSITES

 A nano composite is a multi phase solid material where one of the phases has dimensions of less than 100 nano meters. Nano composites have different properties for specific applications. In this work PVP based...

 Study on Causes and Issues of Big-Data

 An increasing amount of data is becoming available on the internet. Each and every one of us is constantly producing and releasing data about ourselves. We do this either by moving around passively - our behavior...

 Novel Algorithm for Iris Biometrics Using Fast Wavelet Transforms

 Iris recognition is a potential tool in secure personal identification and authentication system which has the properties such as uniqueness, non-invasiveness and stability of human iris patterns. The method propo...

Download PDF file
  • EP ID EP122183
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

Shazia Saleem, Raafiya Gulmeher (30). SECURE CIPHER TEXT POLICY FOR MILITARY. International Journal of Engineering Sciences & Research Technology, 4(6), 97-101. https://www.europub.co.uk/articles/-A-122183