Tuesday, April 2, 2019

Secure Data Retrieval Based on Hybrid Encryption

stop up Data Retrieval Based on crisscross Encryption strong DATA RETRIEVAL BASED ON HYBRID ENCRYPTION FOR DISRUPTION-TOLERANT interlockingKollipara Durgesh, Dr.P. SriramyaI. ABSTRACTMilitary net income is one of the roughly important vane in any country but this mesh topology mostly suffers from intermittent cyberspace connectivity beca practice of the hostile region and the battlefield. To solve the ne iirk problem face by the military network we use Disruption-tolerant network (DTN) techno(prenominal)ogies which is wide change state the undefeated solution. This technology allows the people to communicate with individually otherwise to feeler the cloak-and-dagger information even in the worst network by storing the information in the computer storagehouse client. Some of the most challenging swerves in this scenario be the enforcement of authorization policies and the policies update for set up info convalescence. Two types of encoding be apply for the earnest. The two algorithms are advance Encryption banner (AES) and Java Simplified Encryption (Jasypt). These two algorithms are combined to turn in the un round down open data which is even more difficult to rewrite the confidential data by unauthorized people. In this stem, we propose a see data recuperation scheme by generating a advanced cryptic pigment each time when the exploiter sends a secure data to the finis, this proposed method enhances the security of the confidential data. We demonstrate how to apply the proposed mechanism to firm and efficiently jazz the confidential data distributed in the disruption-tolerant network.Keywords Disruption-tolerant network (DTN), Advanced Encryption cadence (AES), Java Simplified Encryption (Jasypt), secure data retrievalII. INTRODUCTIONIn most of the military network it is in truth difficult for the soldiers and majors to communicate with each other because of thedifficult network environment and even if on that poi nt is no proper to end-to-end tie-up between the vector and the receiver. Disruption-tolerant network (DTN) are widely used in the networks were there is no proper end-to-end connexion between the vector and the receiver. In this make-up we choose DTN to communicate between the soldiers and the others. Initially, if the end-to-end connection is missing between the parentage and destination fit the data from the source thickening has to wait until the network is recovered in the intermediate pommel which can be easily hacked by the third party user consequently to solve this critical problem we use storage node which is introduced in the Disruption-tolerant network where in only the authorized users can addition the various(prenominal) data.Most military data are said to really confidential and hence we use confidential get to hold up methods that are cryptographically enforced. Here we provide assorted devil services for different users that is the admin decides i n who access the data based on the respective denomination of the users. The registration of the user is completed only if the admin accepts and verifies the users tale to be binding but if the user is non authorized he result not be allowed to access the data in spite of the registration. For example if the user 1 sends a data to the user 2 the data will be encrypted by combining two algorithms such as AES and Jasypt and the resulted data will be encrypted and stored in the storage node where even if there is no end-to-end connection between the source and the destination pair the data will be secured in the storage which can be accessed by the respective authorized person.111. ALGORITHMA. Advanced Encryption Standard (AES)The Advanced Encryption Standard (AES) algorithm is used in this paper to provide secure data retrieval scheme. AES algorithm is chosen to be used in this paper because it is said to be more secured which supports most of the secure retrieval scheme. This al gorithm is considered to be more secured because it is more widely used by the U.S. government to protect classified information and is use in hardware and software throughout the world to encrypt secure and confidential data.AES comprises three block ciphers, AES-128, AES-192 and AES-256. Each cipher encrypts and traces data in blocks of 128bitsusing cryptographic nominates of 128-, 192- and 256-bits, respectively. (Rijndael was designed to handle additional block sizes and key lengths, but the functionality was not adopted in AES.) Symmetric or surreptitious-key ciphers use the same key for encrypting and decrypting, so both the sender and the receiver must(prenominal) know and use the same mystery story key. All key lengths are deemed sufficient to protect classified information up to the Secret aim with Top Secret information requiring either 192- or 256-bit key lengths. there are 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys a ro und consists of several(prenominal) processing steps that include substitution, transposition and mixing of the input spare textand transform it into the final output ofcipher text.Various researchers leave create attacks against reduced-round versions of the Advanced Encryption Standard, and a research paper published in 2011 demonstrated that using a technique called a biclique attack could recover AES keys faster than a brute-force attack by a means of between three and five, depending on the cipher version. Even this attack, though, does not stake the practical use of AES due to its high computational complexity.In this paper AES is used along with the DTN technologies because of the many security and hiding challenges. Since near users may change their associated evaluates at some point (for example, move their region), or some private keys might be compromised, key annulment (or update) for each judge is necessary in order to make frames secure. For example, if a us er joins or leaves an associate group, the associated attribute key should be changed and redistributed to all the other members in the group.B. Java Simplified Encryption (Jasypt)The other algorithm used in this paper is Java Simplified Encryption (Jasypt), it is chosen for the crossbredisationizing encoding for a full secured mode to provide secure data retrieval of confidential data. This algorithm is combined with the AES algorithm to provide hybrid encoding. The final challenge in this paper is to provide a sunrise(prenominal) confidential key each time a user sends a hugger-mugger data to the receiver. The secret key generated is unique and it generates a new key each time, which is even more secured for the secure data retrieval. The admin plays a vital role here to manage the overall source and destination pair but the admin is not authorized to access the information because the secret key is generated automatically which is direct to the receivers personal accoun t which is not managed by the admin.Fig 1. Architecture of secure data retrieval in Disruption Tolerant Network (DTN)IV. EXISTING SYSTEMThe living system comprises a concept of attribute-based encryption (ABE) is a promising approach path that fulfills the requirements for secure data retrieval in DTNs. ABE features a mechanism that enables an access control over encrypted data using access policies and ascribed attributes among private keys and ciphertexts. Especially, ciphertext- constitution ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor necessarily to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security indemnity.The problem of applying the ABE to DTNs introduces several security and privacy challenges. Since some users may change their associated attributes at some point (for example, moving their region), or some privat e keys might be compromised, key revocation (or update) for each attribute is necessary in order to make systems secure. However, this issue is even more difficult, especially in ABE systems, since each attribute is conceivably shared by multiple users (henceforth, we refer to such a accruement of users as an attribute group).V. PROPOSED SYSTEMIn the proposed system we use hybrid encryption by combining two algorithms and hence we enhance the security of confidential data. Here the admin keeps in track of all the users account hence even if the attribute of the particular user is changed, the admin makes the notification of the changes. Thus, the disadvantages of the existing system is solved. Unauthorized users who do not have enough credentials fulfill the access policy should be deterred from accessing the plain data in the storage node. In addition, unauthorized access from the storage node or key authorities should be also prevented. If multiple users collude, they may be able to decrypt a ciphertext by combining their attributes even if each of the users cannot decrypt the ciphertext alone.VI. MODULESKey Authorities mental facultyThe key generation module generates secret key where the hybrid encryption occurs using AES and Jasypt algorithm. This key generation is real efficient because it combines the two encryption and produces the secret code. In this paper to growth the security of the military network, the secret key generated by the hybrid encryption is sent to the users personal email id, so that even the admin who manages the entire network will not be able to access the confidential data. storage node moduleIn the storage node module, the data from the sender is stored even when there is no stable network between the sender and the receiver since, we use Disruption Tolerant Network (DTN). The storage node consists of the encrypted data where only the corresponding receiver can access the respective data. To access the data from the storage n ode the receiver has to specify the secret code which is generated by the hybrid encryption and is secretly mailed to the receiver.sender moduleThe sender module is the one who holds the confidential data and wishes to store them into the external data storage node for ease of sharing or for reliable delivery to users in the extreme networking environments. A sender is accountable for defining (attribute based) access policy and enforcing it on its own data by encrypting the data under the policy before storing it to the storage node.Fig 2. Hybrid Encryption of secret messageUser ModuleThis the last module which tends to access the confidential data from the sender which is stored in the storage node. The receiver has to provide the correct secret key which will be sent to his corresponding mail id. If a user possesses a set of attributes red-blooded the access policy of the encrypted data defined by the sender, and is not revoked in any of the attributes, then he will be able to decrypt the cipher text and obtain the data.VII. CONCLUSIONDTN technologies are becoming successful which allows for the communication between devices which do not have stable network and hence this can be more efficiently used in the military network. AES and Jasypt are scalable cryptographic solution to the access control and secure data retrieval. In this paper we proposed efficient data retrieval method using hybrid encryption by combining two algorithms. The encrypted data is then stored in the storage node which can be accessed only by the corresponding user by providing the respective secret key. In addition admin monitors all the attributes of the users which allows fine-grained key revocation for each attribute group. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.VIII. REFERENCES1 J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, Maxprop Routing for veh icle-based disruption tolerant networks, in Proc. IEEE INFOCOM, 2006, pp. 111. 2 M. Chuah andP.Yang,Nodedensity-basedadaptiveroutingscheme for disruption tolerant networks, in Proc. IEEE MILCOM, 2006, pp. 16.3 M. M. B. Tariq, M. Ammar, and E. Zequra, Mesage ferry pathway design for sparse ad hoc networks with mobile nodes, in Proc. ACM MobiHoc, 2006, pp. 3748.4 S.Roy and M.Chuah, warm data retrieval based on cipher text policy attribute-based encryption (CP-ABE) system for the DTNs, Lehigh CSE Tech. Rep., 2009.5 M. Chuah and P. Yang, Performance evaluation of content-based information retrieval schemes for DTNs, in Proc. IEEE MILCOM, 2007, pp. 17.6 M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, Plutus Scalable secure file sharing on untrusted storage, in Proc. Conf. File Storage Technol., 2003, pp. 2942.7 L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, Mediated ciphertext-policy attribute-based encryption and its application, in Proc.WISA, 2009, LNCS 59 32, pp. 309323.8 N. Chen, M. Gerla, D. Huang, and X. Hong, Secure, discriminating group broadcast in vehicular networks using dynamic attribute based encryption, in Proc. Ad Hoc Netw. Workshop, 2010, pp. 18.9 D. Huang and M. Verma, ASPE Attribute-based secure policy enforcementin vehicular adho cnetworks, AdHocNetw.,vol.7,no.8, pp. 15261535, 2009.10A.LewkoandB.Waters,Decentralizing attribute-based encryption, Cryptology ePrint Archive Rep. 2010/351, 2010.11 A. Sahai and B. Waters, Fuzzy identity-based encryption, in Proc. Eurocrypt, 2005, pp. 457473.12 V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in Proc.ACMConf.Comput.Commun.Security,2006,pp.8998.13 J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attributebased encryption, in Proc. IEEE Symp. Security Privacy, 2007, pp. 321334.14 R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures, in Proc. A CM Conf. Comput. Commun. Security, 2007, pp. 195203.15 S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation,in Proc.ASIACCS,2010,pp.261270.16 A. Boldyreva, V. Goyal, and V. Kumar, Identity-based encryption with efficient revocation,inProc.ACMConf.Comput.Commun.Security, 2008, pp. 417426.17M.Pirretti,P.Traynor,P.McDaniel,andB.Waters,Secure attribute based systems,inProc.ACMConf.Comput.Commun.Security,2006, pp. 99112.18S.RafaeliandD.Hutchison,A survey of key management for secure group communication, Comput. Surv., vol. 35, no. 3, pp. 309329, 2003.19 S. Mittra, Iolus A framework for scalable secure multicasting, in Proc. ACM SIGCOMM, 1997, pp. 277288.20 P.Golle, J.Staddon, M. Gagne,and P. Rasmussen,A content-driven access control system, in Proc. Symp. Identity Trust Internet, 2008, pp. 2635.21 L.Cheungand C.Newport,Provably secure cipher text policy ABE, inProc.ACMConf.Comput.Commun.Security,2007,pp.456465.22 V.Goyal, A.Jain,O.Pandey, and A.Sahai ,Bounded cipher text policy attribute-based encryption,inProc.ICALP,2008,pp.579591.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.