Downloads: 118 | Views: 220
Survey Paper | Information Technology | India | Volume 5 Issue 4, April 2016 | Popularity: 6.2 / 10
A Survey on Anonymous User Authentication using Decentralized Key Distribution Architecture
Purva Chavan, Prof. B. P. Vasgi
Abstract: One of the powerful features of Cloud Computing is storing data at the third party site without the hassles of maintenance, storage space, etc. Decentralized access control scheme can be used for securely storing data onto clouds. The scheme enables anonymous authentication of users by hiding users details from the cloud before storing the data. The access control scheme enables the owner of data to grant read and write access only to those who satisfy certain attributes specified by the owner and thus are the valid users. It supports decentralized architecture which prevents single point of failure and workload on a single system. The scheme is thus robust. Also it supports user revocation to prevent stale entry of data.
Keywords: access control, authentication, key distribution center, attribute based encryption, cloud storage
Edition: Volume 5 Issue 4, April 2016
Pages: 724 - 726
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 1850 - 1857Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms
Jeevan Manda
Downloads: 0
Research Paper, Information Technology, United States of America, Volume 11 Issue 8, August 2022
Pages: 1549 - 1559Cybersecurity in Microservices Architectures: Protecting Distributed Retail Applications in Cloud Environments
Yash Jani, Arth Jani, Dhaval Gogri
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Technology, India, Volume 12 Issue 12, December 2023
Pages: 2114 - 2119Zero Knowledge Proof Techniques in PAM Authentication
Sri Kanth Mandru
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Technology, United States of America, Volume 13 Issue 8, August 2024
Pages: 1503 - 1505Optimizing Data Workflows through the Migration from MapR ETL to Airflow S3 Pipelines
Pankaj Dureja
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 13 Issue 7, July 2024
Pages: 1586 - 1598Beyond the Firewall: Securely Exposing Cloud Native API
Ramakrishna Manchana