A Survey on Anonymous User Authentication using Decentralized Key Distribution Architecture
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 4)Publication Date: 2016-04-05
Authors : Purva Chavan; B. P. Vasgi;
Page : 724-726
Keywords : access control; authentication; key distribution center; attribute based encryption; cloud storage;
Abstract
One of the powerful features of Cloud Computing is storing data at the third party site without the hassles of maintenance, storage space, etc. Decentralized access control scheme can be used for securely storing data onto clouds. The scheme enables anonymous authentication of users by hiding users details from the cloud before storing the data. The access control scheme enables the owner of data to grant read and write access only to those who satisfy certain attributes specified by the owner and thus are the valid users. It supports decentralized architecture which prevents single point of failure and workload on a single system. The scheme is thus robust. Also it supports user revocation to prevent stale entry of data.
Other Latest Articles
- A Study on the Application of Pro Grip Self-Fixating Mesh in Patients with Inguinal Hernia Operated by the Lichtenstein Method
- To evaluate the Effect and Comparison of Superoxidised Solution (Oxum) V/S Povidone Iodine (Betadine) in Healing of Wounds
- A Review of Coleoptera Diversity of Chhattisgarh: Updated Checklist 2015
- CFD Analysis of Box Wing Configuration
- A Study of Short Term Outcome of Management of Locally Advanced Breast Cancer
Last modified: 2021-07-01 14:33:56