Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach
نویسنده
چکیده
To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing environment has been recognized as an imperative requirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted information-sharing approach for government departments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of confidential and top secret information amongst security personnels and government departments within the national boundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and government intelligence departments to avoid threatening activities. The experimental results demonstrate the effectiveness of the proposed information sharing approach. Keywords-Digital Government, Government Intelligence Departments, Security Personnels, Information Sharing, Security, Mapping Function, Message Digest 5 (MD5), Public-Key Cryptosystem, Role, Cooperation, Rank.
منابع مشابه
Proposed Information Sharing Security Approach for Security Personnels, Vertical Integration, Semantic Interoperability Architecture and Framework for Digital Government
This paper mainly depicts the conceptual overview of vertical integration, semantic interoperability architecture such as Educational Sector Architectural Framework (ESAF) for New Zealand government and different interoperability framework solution for digital government. In this paper, we try to develop a secure information sharing approach for digital government to improve home land security....
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملAn Enhanced PKI Based Information Sharing Security Protocol for Secure Digital Government and Mobile Government System
Digital Government and Mobile Government are chiefly an issue of receiving public sector Information Technology schemes adapt to interoperability with citizen’s digital government devices furthermore mobile devices. Enhanced interoperability involving public and private organizations is of key value to formulate digital government newfangled victorious. Incidentally, expanding a sound digital g...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کامل