Application of blowfish algorithm for secure transactions in decentralized disruption-tolerant networks

Smita Mahajan*, Dipti Kapoor Sarmah

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Abstract

Disruption-tolerant network (DTN) is the network which tends to lose the connection frequently due to many reasons like environmental issues, software/hardware faults. If the DTN system is not applied with any powerful cryptography, then data can be lost and safety of such device can be wondered. The protection of data is very much essential in the fields like military areas and also in rural areas where poor network connectivity is a consistent issue. The existing system for data transferring and retrieving securely, such as ciphertext-policy attribute-based encryption (CP-ABE), i.e., generating and distributing keys on the basis of attributes, has been successfully implemented. However, there can be chance of knowing the attributes such as name and its basic details about file. In the proposed paper, an effort has been made to provide security by using Blowfish algorithm, two-phase key, and two-phase commit protocol (2pc) for secure data transaction.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Data Engineering and Communication Technology - ICDECT 2017
EditorsAli Husseinzadeh Kashan, Tai Kang, Anand J. Kulkarni, Suresh Chandra Satapathy
PublisherSpringer
Pages13-22
Number of pages10
ISBN (Print)9789811316098
DOIs
Publication statusPublished - 2019
Externally publishedYes
Event2nd International Conference on Data Engineering and Communication Technology, ICDECT 2017 - Pune, India
Duration: 15 Dec 201716 Dec 2017
Conference number: 2

Publication series

NameAdvances in Intelligent Systems and Computing
Volume828
ISSN (Print)2194-5357

Conference

Conference2nd International Conference on Data Engineering and Communication Technology, ICDECT 2017
Abbreviated titleICDECT 2017
Country/TerritoryIndia
CityPune
Period15/12/1716/12/17

Keywords

  • Blowfish
  • Data side information key
  • Disruption-tolerant network
  • Key tree
  • Random bit generator (RBG) key
  • Tile bitmap
  • Two-phase commit protocol
  • Two-phase key
  • n/a OA procedure

Fingerprint

Dive into the research topics of 'Application of blowfish algorithm for secure transactions in decentralized disruption-tolerant networks'. Together they form a unique fingerprint.

Cite this