Decentralized Access Control with Anonymous Authentication for Data security in Clouds

K.L. Narasimha Rao, K.Siva Rama Prasad, Ch. Venkatesh

Abstract


This provides user revocation and prevents replay attacks. Decentralized access control scheme can distribute secret keys for valid user in set of attribute. If the user is not authorized individually decentralized access control distribute authorized secret keys to user in set of attribute such that only that user can encrypt the stored data using its secret key. The proposed algorithm is Token Verification algorithm. Using this algorithm the creator or author of the data can verify who are all modifying the document.
The algorithm provides more security in access control and authentication. Moreover, our authentication and access management theme is suburbanized and sturdy, in contrast to different access management schemes designed for clouds that square measure centralized.

Keywords


Decentralized access control; authentication

Full Text:

PDF




Copyright (c) 2015 K.L. Narasimha Rao, K.Siva Rama Prasad, Ch. Venkatesh

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org