preview

Why Is Security Important In The Military Environment

Decent Essays

In military environment the data has to be transmitted in secured and faster way, even the network is suffer from frequent partitions and intermittent network connectivity. To transmit the data faster and in secure way Disruption-tolerant network is useful, which allow nodes to communicate each other even in this network environment. Rou and Chua h introduce external storage node in disruption tolerant network which stores data for allowing only authorized users to access the data. This Military Network requires sender to entrust their valuable data to users, there have been increasing security and privacy concerns on data. Several schemes employing attribute-based encryption (ABE) for access control over data. However, most of …show more content…

The key-authorities generate private key to the users by giving its own master secret key. When multiple key-authorities are available then each key-authority generates their own attributes individually with their own master secret key. Thus key-authorities are in the first place to keep the data confidential. This is the first security requirement. Data Confidentiality is not enough for secure data transmission in the military environment. Flexible and Fine-Grained access control is also required to make data more secure for the military environment. The information about the particular organization is required to be protected. In this case, access control of sensitive data is done by allowing users to access the data based on their roles. For example, the information about the colleges will be viewed based on their roles such as students, faculty, and higher level …show more content…

In military environment users are r-evocated, in this cases also data has to be transmitted in a secured way. To achieve this, key-authorities has to regenerate the keys for the revoked users. By regenerating the keys, the attribute in access structure changes. When the same attribute set is shared by the multiple users then all the users who are accessing the same data can also effected for changing an attribute key. This implies that revocation of any attribute (i.e., rekeying) or single user (i.e., user changed location) in a group will affect the other user in the group. To avoid this fast redistribution has to done if there are any changes in an

Get Access