ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on Anonymous User Authentication using Decentralized Key Distribution Architecture

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 4)

Publication Date:

Authors : ; ;

Page : 724-726

Keywords : access control; authentication; key distribution center; attribute based encryption; cloud storage;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

One of the powerful features of Cloud Computing is storing data at the third party site without the hassles of maintenance, storage space, etc. Decentralized access control scheme can be used for securely storing data onto clouds. The scheme enables anonymous authentication of users by hiding users details from the cloud before storing the data. The access control scheme enables the owner of data to grant read and write access only to those who satisfy certain attributes specified by the owner and thus are the valid users. It supports decentralized architecture which prevents single point of failure and workload on a single system. The scheme is thus robust. Also it supports user revocation to prevent stale entry of data.

Last modified: 2021-07-01 14:33:56