Open Access   Article Go Back

Secure File Storage System for Disruption-Tolerant Military Environment

Pawar Amol1 , Sonawane Ajay2 , Nandan Pravin3 , Ingole Shubham4

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 189-192, Sep-2015

Online published on Oct 01, 2015

Copyright © Pawar Amol, Sonawane Ajay, Nandan Pravin , Ingole Shubham . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Pawar Amol, Sonawane Ajay, Nandan Pravin , Ingole Shubham, “Secure File Storage System for Disruption-Tolerant Military Environment,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.189-192, 2015.

MLA Style Citation: Pawar Amol, Sonawane Ajay, Nandan Pravin , Ingole Shubham "Secure File Storage System for Disruption-Tolerant Military Environment." International Journal of Computer Sciences and Engineering 3.9 (2015): 189-192.

APA Style Citation: Pawar Amol, Sonawane Ajay, Nandan Pravin , Ingole Shubham, (2015). Secure File Storage System for Disruption-Tolerant Military Environment. International Journal of Computer Sciences and Engineering, 3(9), 189-192.

BibTex Style Citation:
@article{Amol_2015,
author = {Pawar Amol, Sonawane Ajay, Nandan Pravin , Ingole Shubham},
title = {Secure File Storage System for Disruption-Tolerant Military Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {189-192},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=666},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=666
TI - Secure File Storage System for Disruption-Tolerant Military Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Pawar Amol, Sonawane Ajay, Nandan Pravin , Ingole Shubham
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 189-192
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2527 2268 downloads 2360 downloads
  
  
           

Abstract

Secure File Storage System is application to provide security to user for protect his file and also share file bin categorize we will implement some module like data storage module, data encryption module and data retrieval module and facilitate main storage and secondary storage. Now the massive quantity of expanding industrial atmosphere each and everything depends on the other sources to broadcast the data strongly and maintain the data as well in the frequent medium. Convenient nodes in military surroundings, for example, a frontage line or a hostile area are prone to experience irregular system network and common partition. Disruption-tolerant network (DTN) improvement are getting to be productive results that allow remote device get across by officers to tell with other and access the private data consistently by exploitation external capacity nodes or storage nodes. The new approach is to offer effective communication beside to another also access the different information supply through various key establishments like commander or other superiors. This system offer competent scenario for approval strategy and the strategy renew for protected data salvage in most demanding situation. The most assure cryptographic result is commenced to manage the access RSA algorithm.

Key-Words / Index Term

Secure storage, RSA algorithm, disruption-tolerant network (DTN), multiauthority, data retrieval, data encryption, data decryption

References

[1] Ieee Transactions On Networking Vol:22 NO:1 YEAR 2014 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Junbeom Hur and Kyungtae Kang, Member, IEEE, ACM.
[2] M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp.1–6.
[3] M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37–48.
[4] S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
[5] M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.
[6] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc.Conf. File Storage Technol., 2003, pp. 29–42.
[7] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309–323
[8] N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,” in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.
[9] D. Huang and M. Verma, “ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,” Ad Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009.
[10] A. Lewko and B. Waters, “Decentralizing attribute-based encryption,”CryptologyePrint Archive: Rep. 2010/351, 2010.
[11] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc.Eurocrypt, 2005, pp. 457–473.
[12] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc.ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
[13] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp.321–334.
[14] M. Chase and S. S. M. Chow, “Improving privacy and security in multi authority attribute-based encryption,” in Proc. ACM Conf. Comput. Commun. Security, 2009, pp. 121–130.
[15] L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 456– 465.
[16] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with,” in Proc. ASIACCS, 2010, pp. 261–270.
[17] M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attribute based systems,” in Proc. ACMConf. Comput. Commun. Security, 2006, pp. 99–112.