ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Research Article Open Access

Advanced Data Access Scheme in Disruption Tolerant Network

Abstract

Disruption- tolerant network (DTN) technologies are considered to be the successful solutions, allow nodes to communicate with each other in the extreme networking environments. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policy updating for secure data retrieval. The concept of attribute-based encryption (ABE) is a promising approach that full fills the requirements for secure data retrieval in DTN. The existing system involves cipher text-policy attribute-based encryption (CP-ABE) presentation, which provides a scalable way of encrypting data such that the encrypter defines the attribute set that the decrypted needs to process for decrypting the cipher text. However, the problem of applying CP-ABE in decentralized DTN results in several security and privacy challenges with regards to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. So, a secure data retrieval scheme is needed for using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. But the main drawback is that the updating of attributes is not so efficient and high complexity. In order to overcome the above cited problems I am proposing a new technique “Efficient Trust management system (ETMS)”, for reducing complexity and also to improve the security in DTN. In addition to that the geographical routing is also used for finding the location of the nodes. In this method, each node analyzes other neighbour nodes, which are located in the same subtask group. While each subtask group leader (SGL) identifies other SGLs and nodes in its subtask group and followed with the peer-topeer trust evaluation is periodically updated based on either direct observations or indirect observations. The experimental results show that, the proposed ETMS method achieves high efficiency and security with less complexity.

S.Revathi , A.P.V.Raghavendra

To read the full article Download Full Article | Visit Full Article