Mis.M.Jerusha Blessy, Prof.D.V. Rajesh Babu


A protected information recovery plot utilizing CP-ABE for decentralized DTNs where various key specialists deal with their characteristics freely. We show how to apply the proposed instrument to safely and effectively deal with the secret information disseminated in the interruption tolerant military system. Versatile hubs in military situations, for example, a combat zone or an unfriendly area are probably going to experience the ill effects of discontinuous system availability and regular segments. Interruption tolerant system (DTN) advancements are getting to be plainly fruitful arrangements that permit remote gadgets conveyed by warriors to speak with each other and get to the private data or order dependably by abusing outer capacity hubs. The absolute most difficult issues in this situation are the implementation of approval arrangements and the approaches refresh for secure information recovery. Figure content arrangement trait based encryption (CP-ABE is a promising cryptographic answer for the get to control issues. Be that as it may, the issue of applying CP-ABE in decentralized DTNs presents a few security and protection challenges as to the property renouncement, key escrow, and coordination of qualities issued from various specialists.


Access Control; Characteristic Based Encryption (ABE); Interruption Tolerant System (DTN); Multiauthority; Secure Information Recovery;


J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, ―Maxpop: Routing for vehiclebased disturbance tolerant networks,‖ in Proc. IEEE INFOCOM, 2006, pp. 1–11.

M. Chuah and P. Yang, ―Node densitybased versatile directing plan for disturbance tolerant networks,‖ in Proc. IEEE MILCOM, 2006, pp. 1–6.

M. M. B. Tariq, M. Amar, and E. Zequra, ―Message ship course outline for inadequate impromptu systems with portable nodes,‖ in Proc. ACM MobiHoc, 2006, pp. 37–48.

S. Roy and M. Chuah, ―Secure information recovery in light of figure content arrangement characteristic based encryption (CP-ABE) framework for the DTNs,‖ Lehigh CSE Tech. Rep., 2009.

M. Chuah and P. Yang, ―Performance assessment of substance based data recovery plans for DTNs,‖ in Proc. IEEE MILCOM, 2007, pp. 1–7.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, ―Plutus: Scalable secure document sharing on untrusted storage,‖ in Proc. Conf. Record Storage Technol., 2003, pp. 29–42.

L. Ibraimi, M. Petkovic, S. Nikova, P.Hartel, and W. Jonker, ―Mediated ciphertext-arrangement property based encryption and its application,‖ in Proc. WISA, 2009, LNCS 5932, pp. 309–323.

N. Chen, M. Gerla, D. Huang, and X. Hong, ―Secure, particular gathering communicate in vehicular systems utilizing dynamic property based encryption,‖ in Proc. Specially appointed Netw. Workshop, 2010, pp. 1–8. [9] D. Huang and M. Verma, ―ASPE: Quality based secure arrangement authorization in vehicular impromptu networks,‖ Ad Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009.

A. Lewko and B. Waters, ―Decentralizing quality based encryption,‖ Cryptology ePrint Archive: Rep. 2010/351, 2010.

A. Sahai and B. Waters, ―Fuzzy personality based encryption,‖ in Proc. Eurocrypt, 2005, pp. 457–473.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, ―Attribute-based encryption for fine-grained get to control of encoded data,‖ in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.

J. Bethencourt, A. Sahai, and B. Waters, ―Ciphertext-strategy attributebasedencryption,‖ in Proc. IEEE Symp. Security Privacy, 2007, pp. 321–334.

R. Ostrovsky, A. Sahai, and B. Waters, ―Attribute-based encryption with nonmonotonic get to structures,‖ in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 195–203.

S. Yu, C. Wang, K. Ren, and W. Lou, ―Attribute based information offering to property revocation,‖ in Proc. ASIACCS, 2010, pp. 261–270.

A. Boldyreva, V. Goyal, and V. Kumar, ―Identity-based encryption with effective revocation,‖ in Proc. ACM Conf. Comput. Commun. Security, 2008, pp. 417–426.

M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, ―Secure attributebasedsystems,‖ in Proc. ACMConf. Comput. Commun. Security, 2006, pp. 99–112.

S. Rafaeli and D. Hutchison, ―A overview of key administration for secure gathering communication,‖Comput. Surv., vol. 35, no. 3, pp. 309–329, 2003.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.