Downloads: 118
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
Design and Implementation of User Anonymity and Authentication Scheme for Decentralized Access Control in Clouds: Review
Pooja R. Vyawhare | Namrata D. Ghuse [4]
Abstract: Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. To protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage, along with efficient data integrity checking and recovery procedures, becomes critical. So, this work proposes a new decentralized access control scheme for secure data storage in clouds, which supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the ser without knowing the users identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.
Keywords: Access Control, Cloud Computing, Cloud Storage, Anonymous Authentication, decentralized access
Edition: Volume 3 Issue 11, November 2014,
Pages: 1857 - 1861
How to Cite this Article?
Pooja R. Vyawhare, Namrata D. Ghuse, "Design and Implementation of User Anonymity and Authentication Scheme for Decentralized Access Control in Clouds: Review", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 1857-1861, https://www.ijsr.net/get_abstract.php?paper_id=OCT141236
How to Share this Article?
Similar Articles with Keyword 'Access Control'
Downloads: 68
Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021
Pages: 61 - 70Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution
Bopatriciat Boluma Mangata | Eugene Mbuyi Mukendi | Jean-Didier Batubenga
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant | Hingoliwala H. A.