Attribute Based Secure Military Data Retrieval System for Decentralized Disruption Tolerant Networks

Gubbala Siva Krishna, D Ramesh

Abstract


In this section, we provide a multi authority CP-ABE scheme for secure data retrieval in decentralized DTNs. Each local authority issues partial personalized and attribute key components to a user by performing secure 2PC protocol with the central authority. Each attribute key of a user can be updated individually and immediately. Thus, the scalability and security can be enhanced in the proposed scheme. Since the first CP-ABE scheme proposed by Bettencourt et al , dozens of CP-ABE schemes have been proposed. The subsequent CP-ABE schemes are mostly motivated by more rigorous security proof in the standard model. However, most of the schemes failed to achieve the expressiveness of the Bettencourt et al.’s scheme, which described an efficient system that was expressive in that it allowed an encrypt or to express an access predicate in terms of any monotonic formula over attributes. Therefore, in this section, we develop a variation of the CP-ABE algorithm partially based on (but not limited to) Bettencourt et al.’s construction in order to enhance the expressiveness of the access control policy instead of building a new CP-ABE scheme from scratch


Keywords


Access control, attribute-based encryption (ABE), disruption-tolerant network (DTN), multi authority, secure data retrieval, CP-ABE.

References


J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for vehicle-based disruption tolerant networks,†in Proc. IEEE INFOCOM, 2006, pp. 1–11.

M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,†in Proc. IEEE MILCOM, 2006, pp. 1–6.

M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,†in Proc. ACM MobiHoc, 2006, pp. 37–48.

S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,†Lehigh CSE Tech. Rep., 2009.

M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,†in Proc. IEEE MILCOM, 2007, pp. 1–7.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,†in Proc. Conf. File Storage Technol., 2003, pp. 29–42.

L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,†in Proc. WISA, 2009, LNCS 5932, pp. 309–323.

N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,†in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.

D. Huang and M. Verma, “ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,†Ad Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009.

A. Lewko and B. Waters, “Decentralizing attribute-based encryption,†Cryptology ePrint Archive: Rep. 2010/351, 2010.

A. Sahai and B. Waters, “Fuzzy identity-based encryption,†in Proc. Eurocrypt, 2005, pp. 457–473.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,†in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,†in Proc. IEEE Symp. Security Privacy, 2007, pp. 321–334.

R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based encryption with non-monotonic access structures,†in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 195–203.

S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,†in Proc. ASIACCS, 2010, pp. 261–270.

A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,†in Proc. ACM Conf. Comput. Commun. Security, 2008, pp. 417–426.

M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attributebased systems,†in Proc. ACMConf. Comput. Commun. Security, 2006, pp. 99–112.


Full Text: PDF [FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â