期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2015
卷号:3
期号:4
DOI:10.15680/ijircce.2015.0304099
出版社:S&S Publications
摘要:To establish a communication among wireless devices and to retrieve the data securely Disruptiontolerant network (DTN) is introduced. For maintaining the data confidential many cryptographic solutions are used.The issues in accessing the information is solved by the algorithm called Ciphertext Policy-Attribute Based Encryption.This has enormous challenge in providing security for the information. In decentralized DTN, CP-ABE is implementedwith multiple key authorities that handle the attributes individually. Two party computation protocols are introduced inCP-ABE to protect the authority’s interest in knowing the private keys created by others. The fine-drawn secretreversals are made for each and every feature set. Any monotone access structure can be used for creating the accesspolicy in CP-ABE. In this the key authorities may be adjusted or not entirely believed. To maintain the trust partiallythe assumption is made such that the central authority does not conspiracy with local authority. To improve the trustwe proposed an improved CP-ABE, in this we determine the trust of each user node in a network by estimating the trustof every node and updates the trust, so the user can have their trust in authority that generates the key for confidentialdata. By including the trust in CP-ABE, the users can trust the key authority for accessing the information securely. Theprivacy of the sending data and the data which are stored in storage node are maintained confidential by using theproposed system. Thus the proposed system has high degree of trust in the nodes