International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 118

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


Design and Implementation of User Anonymity and Authentication Scheme for Decentralized Access Control in Clouds: Review

Pooja R. Vyawhare | Namrata D. Ghuse [4]


Abstract: Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. To protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage, along with efficient data integrity checking and recovery procedures, becomes critical. So, this work proposes a new decentralized access control scheme for secure data storage in clouds, which supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the ser without knowing the users identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.


Keywords: Access Control, Cloud Computing, Cloud Storage, Anonymous Authentication, decentralized access


Edition: Volume 3 Issue 11, November 2014,


Pages: 1857 - 1861


How to Cite this Article?

Pooja R. Vyawhare, Namrata D. Ghuse, "Design and Implementation of User Anonymity and Authentication Scheme for Decentralized Access Control in Clouds: Review", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 1857-1861, https://www.ijsr.net/get_abstract.php?paper_id=OCT141236

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Access Control'

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata | Eugene Mbuyi Mukendi | Jean-Didier Batubenga

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant | Hingoliwala H. A.

Share this Article


Top