Fastened Data Retrieval Algorithm (FDRA)

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-23 Number-3
Year of Publication : 2015
Authors : S.Suseela, B.Purushotham
  10.14445/22312803/IJCTT-V23P124

MLA

S.Suseela, B.Purushotham "Fastened Data Retrieval Algorithm (FDRA)". International Journal of Computer Trends and Technology (IJCTT) V23(3):113-115, May 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Fastened Data Retrieval Algorithm (FDRA) is an approach to protect the data in a decentralized network. Disruption-tolerant network (DTN) technologies are most popular to retrieve information on wireless devices by exploiting external storage devices. The most challenging issue here is confidentiality and reliability. This can be achieved by using Cipher text-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, secret-key and coordination of these attributes issued from different authorities. H-IBBE is a considerably promising, it has an extremely strong security proof based on worst-case hardness, relative efficient implementations, and significant simplicity because of its structure. Many identitybased encryption (IBE) and hierarchical identity-based encryption (HIBE) schemes from lattices. Motivated by the IBBE scheme, we propose FDRA using H-IBBE for decentralized DTN.

References
[1] Junbeom Hur and Kyungtae Kang, “Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks”, in Proc. IEEE/ACM Transactions on Networking, 2014, vol. 22, pp. 16-26.
[2] S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
[3] J.Bethen Court, A. Sahai and B.Waters, “Cyphertext Policy Attribute Based Encryption”, in Proc. IEEE symp. Security Privacy, 2007, pp. 321-334.
[4] V. Goyal, O. Pandey, A. Sahai and B.Waters, “Attribute Based Encryption For Fine Grained Access Control Of Encrypted Data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89-98.
[5] R. Ostrovsky, A. Sahai and B.Waters, “Attribute Based Encryption With Nonmonotonic Access Structures,” in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 195-203.
[6] A. Lewko and B.Waters, “Decentralizing Attribute Based Encryption,” Cryptology print Archive: Rep. 2010/351, 2010.
[7] S. Yu, C. Wang, K. Ren and W. Lou, “Attribute Based Data Sharing With Attribute Revocation,” inProc. ASIACCS, 2010, pp. 261-270.
[8] D. Huang and M.Varma, “ASPE: Attribute Based Secure Policy Enforcement In Vehicular Ad Hoc Networks,” Ad Hoc Netw., Vol.7, no. 8, pp. 1526-1535, 2009.
[9] A. Sahai and B. Waters, “Fuzzy Identity Based Encryption”, in Proc. Eurocrypt,2005, pp. 457-473.
[10] L. Ibraimi, M. Petkovic, S. Nikova, P. Harpel and W. Jonker, “Mediated Ciphertext Policy Attribute Based Encryption And Its Application,” in Proc. WISA, 2009, LNCS 5932, pp. 303-323.
[11] N. Chen, M. Gerla, D. Huang and X. Hong, “Secure, Selective Route Broadcast In Vehicular Networks Using Dynamic Attribute Based Encryption,” in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1-8.
[12] M.M.B. Tarq, M. Ammar and E. Zerqura, “Message Ferry Route Design For Sparse Ad Hoc Networks With Mobile Nodes,” in Proc. ACM Mobihocs., 2006, pp. 37-48.
[13] A.S.Agrawal, D.Boneh and X.Boyen “Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE”.

Keywords
Fastened Data Retrieval Algorithm (FDRA), Disruption-tolerant network (DTN), Cipher text-policy attributebased encryption (CP-ABE), Identity based encryption (IBE).