Visible to the public Comparative study on KP-ABE and CP-ABE algorithm for secure data retrieval in military network

TitleComparative study on KP-ABE and CP-ABE algorithm for secure data retrieval in military network
Publication TypeConference Paper
Year of Publication2017
AuthorsSelar, G Dheeraj, Apoorva, P
Conference Name2017 International Conference on Intelligent Computing and Control (I2C2)
Date PublishedJune 2017
PublisherIEEE
ISBN Number978-1-5386-0374-1
Keywordsattribute based encryption, Attribute Revocation and Attribute Based Encryption, authorisation, cipher text approach, Collaboration, computer network reliability, Computer science, CP-ABE algorithm, cryptography, Decentralized Networks, disruption-tolerant networks, Disruption-Tolerant systems, Encryption, Key Escrow, Key Managements, key policy attribute based encryption, key revocation, KP-ABE, military communication, military computing, military network, policy-based governance, pubcrawl, reliability, reliable data transmission, remote devices, Scalability, secure data retrieval, war zone
Abstract

In many hostile military environments for instance war zone, unfriendly nature, etc., the systems perform on the specially promoted mode and nature which they tolerate the defined system network architecture. Preparation of Disruption-Tolerant systems (DTN) enhances the network between the remote devices which provided to the soldiers in the war zone, this situation conveys the reliable data transmission under scanner. Cipher text approach are based on the attribute based encryption which mainly acts on the attributes or role of the users, which is a successful cryptographic strategy to maintain the control issues and also allow reliable data transfer. Specially, the systems are not centralized and have more data constrained issues in the systems, implementing the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) was an important issue, where this strategy provides the new security and data protection approach with the help of the Key Revocation, Key Escrows and collaboration of the certain attributes with help of main Key Authorities. This paper mainly concentrates on the reliable data retrieval system with the help of CP-ABE for the Disruption-Tolerant Networks where multiple key authorities deal with respective attributes safely and securely. We performed comparison analysis on existing schemes with the recommended system components which are configured in the respective decentralized tolerant military system for reliable data retrieval.

URLhttps://ieeexplore.ieee.org/document/8321816
DOI10.1109/I2C2.2017.8321816
Citation Keyselar_comparative_2017