Secure File Storage System for Disruption-Tolerant Military Environment
Keywords:
Secure storage, RSA algorithm, disruption-tolerant network (DTN), multiauthority, data retrieval, data encryption, data decryptionAbstract
Secure File Storage System is application to provide security to user for protect his file and also share file bin categorize we will implement some module like data storage module, data encryption module and data retrieval module and facilitate main storage and secondary storage. Now the massive quantity of expanding industrial atmosphere each and everything depends on the other sources to broadcast the data strongly and maintain the data as well in the frequent medium. Convenient nodes in military surroundings, for example, a frontage line or a hostile area are prone to experience irregular system network and common partition. Disruption-tolerant network (DTN) improvement are getting to be productive results that allow remote device get across by officers to tell with other and access the private data consistently by exploitation external capacity nodes or storage nodes. The new approach is to offer effective communication beside to another also access the different information supply through various key establishments like commander or other superiors. This system offer competent scenario for approval strategy and the strategy renew for protected data salvage in most demanding situation. The most assure cryptographic result is commenced to manage the access RSA algorithm.
References
Ieee Transactions On Networking Vol:22 NO:1 YEAR 2014 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Junbeom Hur and Kyungtae Kang, Member, IEEE, ACM.
M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp.1–6.
M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37–48.
S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc.Conf. File Storage Technol., 2003, pp. 29–42.
L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323
N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,” in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.
D. Huang and M. Verma, “ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,” Ad Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009.
A. Lewko and B. Waters, “Decentralizing attribute-based encryption,”CryptologyePrint Archive: Rep. 2010/351, 2010.
A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc.Eurocrypt, 2005, pp. 457–473.
V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc.ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp.321–334.
M. Chase and S. S. M. Chow, “Improving privacy and security in multi authority attribute-based encryption,” in Proc. ACM Conf. Comput. Commun. Security, 2009, pp. 121–130.
L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 456– 465.
S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with,” in Proc. ASIACCS, 2010, pp. 261–270.
M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attribute based systems,” in Proc. ACMConf. Comput. Commun. Security, 2006, pp. 99–112.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
