International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 118 | Views: 220

Survey Paper | Information Technology | India | Volume 5 Issue 4, April 2016 | Popularity: 6.2 / 10


     

A Survey on Anonymous User Authentication using Decentralized Key Distribution Architecture

Purva Chavan, Prof. B. P. Vasgi


Abstract: One of the powerful features of Cloud Computing is storing data at the third party site without the hassles of maintenance, storage space, etc. Decentralized access control scheme can be used for securely storing data onto clouds. The scheme enables anonymous authentication of users by hiding users details from the cloud before storing the data. The access control scheme enables the owner of data to grant read and write access only to those who satisfy certain attributes specified by the owner and thus are the valid users. It supports decentralized architecture which prevents single point of failure and workload on a single system. The scheme is thus robust. Also it supports user revocation to prevent stale entry of data.


Keywords: access control, authentication, key distribution center, attribute based encryption, cloud storage


Edition: Volume 5 Issue 4, April 2016


Pages: 724 - 726



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Purva Chavan, Prof. B. P. Vasgi, "A Survey on Anonymous User Authentication using Decentralized Key Distribution Architecture", International Journal of Science and Research (IJSR), Volume 5 Issue 4, April 2016, pp. 724-726, https://www.ijsr.net/getabstract.php?paperid=NOV162191

Similar Articles

Downloads: 0

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 0

Research Paper, Information Technology, United States of America, Volume 11 Issue 8, August 2022

Pages: 1549 - 1559

Cybersecurity in Microservices Architectures: Protecting Distributed Retail Applications in Cloud Environments

Yash Jani, Arth Jani, Dhaval Gogri

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Technology, India, Volume 12 Issue 12, December 2023

Pages: 2114 - 2119

Zero Knowledge Proof Techniques in PAM Authentication

Sri Kanth Mandru

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Technology, United States of America, Volume 13 Issue 8, August 2024

Pages: 1503 - 1505

Optimizing Data Workflows through the Migration from MapR ETL to Airflow S3 Pipelines

Pankaj Dureja

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 13 Issue 7, July 2024

Pages: 1586 - 1598

Beyond the Firewall: Securely Exposing Cloud Native API

Ramakrishna Manchana

Share this Article
Top