Decentralized Access Control with Anonymous Authentication for Data security in Clouds
Abstract
This provides user revocation and prevents replay attacks. Decentralized access control scheme can distribute secret keys for valid user in set of attribute. If the user is not authorized individually decentralized access control distribute authorized secret keys to user in set of attribute such that only that user can encrypt the stored data using its secret key. The proposed algorithm is Token Verification algorithm. Using this algorithm the creator or author of the data can verify who are all modifying the document.
The algorithm provides more security in access control and authentication. Moreover, our authentication and access management theme is suburbanized and sturdy, in contrast to different access management schemes designed for clouds that square measure centralized.
The algorithm provides more security in access control and authentication. Moreover, our authentication and access management theme is suburbanized and sturdy, in contrast to different access management schemes designed for clouds that square measure centralized.
Keywords
Decentralized access control; authentication
Full Text:
PDFCopyright (c) 2015 K.L. Narasimha Rao, K.Siva Rama Prasad, Ch. Venkatesh
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
All published Articles are Open Access at https://journals.pen2print.org/index.php/ijr/
Paper submission: ijr@pen2print.org