secure data retrieval for decentralized disruption-tolerant military networks

19
Presented by Sneha Joshi STJIT, RNR Secure Data Retrieval for Decentralized Disruption Tolerant Military Networks

Upload: sneha-joshi

Post on 28-Jul-2015

419 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: secure data retrieval for decentralized disruption-tolerant military networks

Presented by Sneha Joshi STJIT, RNR

Secure Data Retrieval for Decentralized Disruption

Tolerant Military Networks

Page 2: secure data retrieval for decentralized disruption-tolerant military networks

Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from network connectivity and frequent partitions.

Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes.

Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues.

Abstract

Page 3: secure data retrieval for decentralized disruption-tolerant military networks

Introduction Existing System Proposed System Objectives SRS Architecture Module Description Software Methodology UML diagrams Conclusion References

Contents

Page 4: secure data retrieval for decentralized disruption-tolerant military networks

What is Disruption Tolerant Network ?

Introduction

Page 5: secure data retrieval for decentralized disruption-tolerant military networks

Attribute-based encryption (ABE)

Disadvantages security and privacy challenges private keys might be compromised key escrow problem coordination of attributes issued from

different authorities.

Existing System

Page 6: secure data retrieval for decentralized disruption-tolerant military networks

Ciphertext-policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy.

Proposed System

Page 7: secure data retrieval for decentralized disruption-tolerant military networks

Data confidentiality Collusion-resistance Backward and forward Secrecy

Page 8: secure data retrieval for decentralized disruption-tolerant military networks

1.Business Rules 2.Transaction corrections, adjustments,

cancellations3.Authentication 4.Authorization –functions user is delegated to

perform5.Audit Tracking

Non-Functional Requirements1.Accessibility2.Availability3.Reliability

Functional Requirements

Page 9: secure data retrieval for decentralized disruption-tolerant military networks

HARDWARE REQUIREMENTS:

System : Pentium IV 2.4 GHz Hard Disk : 40 GB RAM : 512 MB SOFTWARE REQUIREMENTS:

Operating system : Windows XP/7 Coding Language : JAVA IDE : Eclipse Kepler

Software & Hardware requirements

Page 10: secure data retrieval for decentralized disruption-tolerant military networks

Architecture

Page 11: secure data retrieval for decentralized disruption-tolerant military networks

Key Authorities Storage node Sender Soldier (user)

Module Description

Page 12: secure data retrieval for decentralized disruption-tolerant military networks

Key Authorities

Page 13: secure data retrieval for decentralized disruption-tolerant military networks

Sender User

Storage node

Page 14: secure data retrieval for decentralized disruption-tolerant military networks

Agile Methodology

Agile development methods break tasks into small increments with the minimal planning and do not directly involve long-term planning.

Adaptive planning Evolutionary development Early delivery Continuous improvement Encourages rapid response to change

Software Methodology

Page 15: secure data retrieval for decentralized disruption-tolerant military networks

XP : XP stands for “extreme programming”. It concentrates on development rather than managerial aspects of software projects

Scrum : includes both managerial and development processes Scrum Management Scrum Development

XP & Scrum

Page 16: secure data retrieval for decentralized disruption-tolerant military networks

Use Case diagram : The main purpose of a use case diagram is to show what system functions are performed for which actor

UML Diagrams

Sender

Soldiers

Sensor Head

Enter and Encryptthe Message

Send Key and Messageto Sensor Head

Start Sensing the sensor Nodes

Transfer Messageand Key to Soldiers

Receive the EncryptedMessage

Register

Generate Secret Key

Enter the Secret Keyand Decrypt the Message

Page 17: secure data retrieval for decentralized disruption-tolerant military networks

Sequence DiagramInteraction diagram that shows how processes operate

with one another and in what order

Sender Soldier

LoginLogin

Enter the Message

Sensor Head

Encrypt the Message

Generate a Secret Key

Send Key and Msg to Sensor Head

Start Sensing the Sensor Nodes

Transfer Msg and Key to Soldiers

Receive the Encrypted Message

Enter the Secret Keyand Decrypt the Message

Page 18: secure data retrieval for decentralized disruption-tolerant military networks

DTN technologies are becoming successful solutions in military applications that allow wireless devices to communicate with each other and access the confidential information reliably by exploiting external storage nodes. CP-ABE is a scalable cryptographic solution to the access control and secure data retrieval issues. In this paper, we proposed an efficient and secure data retrieval method using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. The inherent key escrow problem is resolved such that the confidentiality of the stored data is guaranteed even under the hostile environment where key authorities might be compromised or not fully trusted. In addition, the fine-grained key revocation can be done for each attribute group. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption- tolerant military network.

Page 19: secure data retrieval for decentralized disruption-tolerant military networks

Thank you.Any Queries

?