Book Details


International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format


Versatile hubs in Ad-hoc environments, such as an unfriendly locale are liable to experience the ill effects of discontinuous system network and continuous parcels. Disturbance tolerant system (DTN) progresses are getting to be effective measures that permit remote devices carried by troopers to speak with one another and access the classified data or order consistently by misusing outer stockpiling hubs. Probably the most difficult issues in this situation are the requirement of approval arrangements and the approaches overhaul for secure information recovery.Cipher text-arrangement trait based encryption (CP-TBE) is a promising cryptographic answer for the entrance control issues. In any case, the issue of applying CP-TBE in decentralized DTNs presents a few securities and protection challenges with respect to the attribute renouncement, keyescrow, and coordination of assets issued from distinctive powers. In this paper, we propose a protected information recovery plan utilizing CP-TBE for decentralized DTNs where different key powers deal with their characteristics freely. We exhibit how to apply the proposed component to safely and proficiently deal with the secret information circulated in the disturbance tolerant Ad-hoc environmental system.


[1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine,“Maxprop:Routing for vehicle-based disruption tolerant networks,” in Proc.IEEE INFOCOM, 2006, pp. 1–11.
[2] M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp.1–6.
[3] M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37–48.
[4] S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-TBE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
[5] M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.
[6] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu,“Plutus: Scalable secure file sharing on untrusted storage,” in Proc.Conf. File Storage Technol., 2003, pp. 29–42.
[7] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W.Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,”inProc. WISA, 2009, LNCS 5932, pp. 309–323.
[8] N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure,selective group broadcast in vehicular networks using dynamic attribute based encryption,”inProc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.
[9] D. Huang and M. Verma, “ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,” Ad Hoc Netw., vol. 7, no. 8,pp. 1526–1535, 2009.
[10] A. Lewko and B. Waters, “Decentralizing attribute-based encryption,”Cryptology ePrint Archive: Rep. 2010/351, 2010
[11] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Eurocrypt, 2005, pp. 457–473.
[12] V. Goyal, O. Pandey, A. Sahai, and B. Waters,“Attribute-based encryption for fine-grained access control of encrypted data,” in Proc.ACM Conf. Comput.Commun. Security, 2006, pp. 89–98.
[13] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertextpolicy attributebased encryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp.321–334.
[14] R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based encryption with non-monotonic access structures,” in Proc. ACM Conf.Comput. Commun. Security, 2007, pp. 195–203.
[15] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proc. ASIACCS, 2010, pp. 261–270.
[16] A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proc. ACM Conf. Comput.Commun. Security,2008, pp. 417–426.
[17] M. Pirretti, P. Traynor, P. McDaniel, and B. Waters,“Secure attributebased systems,” in Proc. ACMConf. Comput.Commun.Security,2006, pp. 99–112.
[18] S. Rafaeli and D. Hutchison, “A survey of key management for secure group communication,” Comput. Surv., vol. 35, no. 3, pp.309–329,2003.


Trait based encryption (TBE), Disturbance Tolerant Network (DTN), CP-TBE.

  • Format Volume 3, Issue 2, No 1, 2015
  • Copyright All Rights Reserved ©2015
  • Year of Publication 2015
  • Author Miss. S. ShamaParveen, Sri. K. Sreenivasulu, Professor&H.O.D
  • Reference IJCS-099
  • Page No 568-573

Copyright 2021 SK Research Group of Companies. All Rights Reserved.