Secure Data retrieval based on DTN

Authors(1) :-K. Malarvizhi

Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.

Authors and Affiliations

K. Malarvizhi
PG Scholar, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India

Disruption-tolerant network , CP-ABE, decentralized

  1. J. Burgess, B. Gallagher, D. Jensen, B. N. Levine, "Maxprop: Routing for vehicle-based disruption tolerant networks", Proc. IEEE INFOCOM, pp. 1-11, 2006.
  2. M. Chuah, P. Yang, "Node density-based adaptive routing scheme for disruption tolerant networks", Proc. IEEE MILCOM, pp. 1-6, 2006.
  3. M. M. B. Tariq, M. Ammar, E. Zequra, "Mesage ferry route design for sparse ad hoc networks with mobile nodes", Proc. ACM MobiHoc, pp. 37-48, 2006.
  4. S. Roy, M. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs”, 2009.
  5. M. Chuah, P. Yang, "Performance evaluation of content-based information retrieval schemes for DTNs", Proc. IEEE MILCOM, pp. 1-7, 2007.
  6. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, K. Fu, "Plutus: Scalable secure file sharing on untrusted storage", Proc. Conf. File Storage Technol., pp. 29-42, 2003.
  7. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, W. Jonker, "Mediated ciphertext-policy attribute-based encryption and its application", Proc. WISA, pp. 309-323, 2009.
  8. N. Chen, M. Gerla, D. Huang, X. Hong, "Secure selective group broadcast in vehicular networks using dynamic attribute based encryption", Proc. Ad Hoc Netw. Workshop, pp. 1-8, 2010.
  9. D. Huang, M. Verma, "ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks", Ad Hoc Netw., vol. 7, no. 8, pp. 1526-1535, 2009.
  10. A. Lewko, B. Waters, “Decentralizing attribute-based encryption”, 2010.
  11. A. Sahai, B. Waters, "Fuzzy identity-based encryption", Proc. Eurocrypt, pp. 457-473, 2005.
  12. V. Goyal, O. Pandey, A. Sahai, B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data", Proc. ACM Conf. Comput. Commun. Security, pp. 89-98, 2006.
  13. J. Bethencourt, A. Sahai, B. Waters, "Ciphertext-policy attribute-based encryption", Proc. IEEE Symp. Security Privacy, pp. 321-334, 2007.
  14. R. Ostrovsky, A. Sahai, B. Waters, "Attribute-based encryption with non-monotonic access structures", Proc. ACM Conf. Comput. Commun. Security, pp. 195-203, 2007.
  15. S. Yu, C. Wang, K. Ren, W. Lou, "Attribute based data sharing with attribute revocation", Proc. ASIACCS, pp. 261-270, 2010.
  16. A. Boldyreva, V. Goyal, V. Kumar, "Identity-based encryption with efficient revocation", Proc. ACM Conf. Comput. Commun. Security, pp. 417-426, 2008.
  17. M. Pirretti, P. Traynor, P. McDaniel, B. Waters, "Secure attribute-based systems", Proc. ACM Conf. Comput. Commun. Security, pp. 99-112, 2006.
  18. S. Rafaeli, D. Hutchison, "A survey of key management for secure group communication", Comput. Surv., vol. 35, no. 3, pp. 309-329, 2003.
  19. S. Mittra, "Iolus: A framework for scalable secure multicasting", Proc. ACM SIGCOMM, pp. 277-288, 1997.
  20. P. Golle, J. Staddon, M. Gagne, P. Rasmussen, "A content-driven access control system", Proc. Symp. Identity Trust Internet, pp. 26-35, 2008.
  21. L. Cheung, C. Newport, "Provably secure ciphertext policy ABE", Proc. ACM Conf. Comput. Commun. Security, pp. 456-465, 2007.
  22. V. Goyal, A. Jain, O. Pandey, A. Sahai, "Bounded ciphertext policy attribute-based encryption", Proc. ICALP, pp. 579-591, 2008.
  23. X. Liang, Z. Cao, H. Lin, D. Xing, "Provably secure and efficient bounded ciphertext policy attribute based encryption", Proc. ASIACCS, pp. 343-352, 2009.
  24. M. Chase, S. S. M. Chow, "Improving privacy and security in multi-authority attribute-based encryption", Proc. ACM Conf. Comput. Commun. Security, pp. 121-130, 2009.
  25. M. Chase, "Multi-authority attribute based encryption", Proc. TCC, pp. 515-534, 2007.
  26. S. S. M. Chow, "Removing escrow from identity-based encryption", Proc. PKC, pp. 256-276, 2009.
  27. M. Belenkiy, M. Chase, M. Kohlweiss, A. Lysyanskaya, "P-signatures and noninteractive anonymous credentials", Proc. TCC, pp. 356-374, 2008.
  28. M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Hysyanskaya, H. Shacham, "Randomizable proofs and delegatable anonymous credentials", Proc. Crypto, pp. 108-125.
  29. D. Naor, M. Naor, J. Lotspiech, "Revocation and tracing schemes for stateless receivers", Proc. CRYPTO, pp. 41-62, 2001.
  30. C. K. Wong, M. Gouda, S. S. Lam, "Secure group communications using key graphs", Proc. ACM SIGCOMM, pp. 68-79, 1998.
  31. A. T. Sherman, D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees", IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444-458, May 2003.
  32. K. C. Almeroth, M. H. Ammar, "Multicast group behavior in the Internet's multicast backbone (MBone)", IEEE Commun. Mag., vol. 35, no. 6, pp. 124-129, Jun. 1997.
  33. “The Pairing-Based Cryptography Library”, Accessed Aug. 2010.

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2019
Date of Publication : 2019-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 121-129
Manuscript Number : SHISRRJ19236
Publisher : Shauryam Research Institute

ISSN : 2581-6306

Cite This Article :

K. Malarvizhi, "Secure Data retrieval based on DTN", Shodhshauryam, International Scientific Refereed Research Journal (SHISRRJ), ISSN : 2581-6306, Volume 2, Issue 2, pp.121-129, March-April.2019
URL : https://shisrrj.com/SHISRRJ19236

Article Preview