Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 17, Pages: 1-6
Sai Ram Kiran Konduri * , T. Anuradha, K. Vishnu and Gireesh Kota
Departmentof Electronics andComputer Engineering,Koneru LakshmaishUniversity,GunturDistrict- 522502, Andhra Pradesh, India; [email protected], anuradha_ecm@ kluniversity.in, [email protected], [email protected],
*Author of Corresponding: Sai Ram Kiran Konduri Departmentof Electronics andComputer Engineering,Koneru LakshmaishUniversity,GunturDistrict- 522502, Andhra Pradesh, India; [email protected]
Objectives: The main objective is to provide security for confidential information by exploiting external storage nodes applications for mobile nodes in military environments by using secure hash algorithm. Methods and analysis: In military environments we are having measure partitions like a parcel or a hostile region. There is no doubt at all they suffer from intermittent network property. They are having frequent partitions. Disruption-tolerant network DTN technologies are may be a true and simple solutions. DTN is a Disruption-tolerant network. Findings: These devices take the counseling or control dependably by extending memory module nodes. In these networking environments DTN is extremely successful technology. Once there’s no wired affiliation in between supply and destination device, data from supply node need to wait within middle nodes for oversized quantity for your duration until the affiliation would be properly established. One amongst the difficult approach may be a ABE. That’s attribute-based coding that fulfill the requirements to get secure data extraction through DTNs.Here the conception is Cipher text Policy ABE (CP-ABE).Improvement: It provides the applicable means of coding of knowledge. The coding includes the dataset that the secret writing must possess so as to decrypt the cipher text. Hence, different type of users may be given to decrypt complete different components of knowledge in line with the safety policy
Keywords: CP-ABE, DTN, Military Networks, Password, Secure Hash Algorithm
Subscribe now for latest articles and news.