Professional Documents
Culture Documents
Batch A6
Batch A6
established.
EXISTING SYSTEM:
• ABE features a mechanism that enables an access control over encrypted data
using access policies and ascribed attributes among private keys and cipher
texts.
• Especially, cipher text-policy ABE (CP-ABE) provides a scalable way of
encrypting data such that the encrypt or defines the attribute set that the
descriptor needs to possess in order to decrypt the cipher text.
DISADVANTAGES
• The problem of applying the ABE to DTNs introduces several security and
privacy challenges.
• Especially in ABE systems, since each attribute is conceivably shared by
multiple users.
• When multiple authorities manage and issue attributes keys to users
independently with their own master secrets, it is very hard to define fine-
grained access policies over attributes issued from different authorities.
PROPOSED SYSTEM:
• In this paper, we propose a secure data retrieval scheme using CP-ABE for
independently
• First, immediate attribute revocation enhances backward/forward secrecy of
access structure under attributes issued from any chosen set of authorities.
• Third, the key escrow problem is resolved by an escrow-free key issuing
• Data confidentiality.
• Collusion-resistance.
• Backward and forward Secrecy.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
• HARDWARE REQUIREMENTS:
AssignPolicy RevokePolicy
ArrayList : policy UpdateMessage String : id
ShowNetwork
String : id String : msg String : policy
String : policy ArrayList : soldiers
String : policy int : left,top String : msg
String : msg File : file
updateMessage() showNetwork()
addPolicy() updatePolicy()
GenerateKey
String : file
String : attributes
generateKey()
writeKey()
Use case diagram
AddPolicy
Login
DefineAccessPolicy UpdateMessage
Admin
GenerateKeys MiltaryNetwork
PolicyAssignment RevokeKeys
Sequence diagram
Admin Login SecureData DataPolicy AssignPolicy Update ShowNetwork
Message
Login as a admin
Policy Created
Generate Keys
Keys generated
Policy Assignment
Update message
Message updated
Show Network
Update message will be displayed here when the particular soldier comes nearer to storage node
Revoke keys
Update Policy
• The fine-grained key revocation can be done for each attribute group.
References
• Secure Data retrieval based on DTN by K Malarvizhi ,Shodhshauryam, International
Scientific Refereed Research Journal ,2019
• JunbeomHur and Kyungtae Kang, Member, IEEE, ACM “Secure Data Retrieval for
Decentralized Disruption-Tolerant Military Networks”-IEEE/ACM TRANSACTIONS ON
NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014
• Secure Data Transpiration and Retrieval (SDTR) algorithm for Army in Decentralized
Disruption Tolerant Military Networks” by Alqahtani, A S, NISCAIR-CSIR,2019
• Enhanced disruption tolerant network (DTN) framework for improving network efficiency in
rural areas by Sundresan Perumal, Valliappan Raman, Ganthan Narayana Samy, Bharanidharan
Shanmugam, Karthiggaibalan Kisenasamy & Suresh Ponnan ,
International Journal of System Assurance Engineering and Management volume 13, pages
710–717 (2022)