Downloads: 118 | Views: 249
Survey Paper | Information Technology | India | Volume 5 Issue 4, April 2016 | Popularity: 6.2 / 10
A Survey on Anonymous User Authentication using Decentralized Key Distribution Architecture
Purva Chavan, Prof. B. P. Vasgi
Abstract: One of the powerful features of Cloud Computing is storing data at the third party site without the hassles of maintenance, storage space, etc. Decentralized access control scheme can be used for securely storing data onto clouds. The scheme enables anonymous authentication of users by hiding users details from the cloud before storing the data. The access control scheme enables the owner of data to grant read and write access only to those who satisfy certain attributes specified by the owner and thus are the valid users. It supports decentralized architecture which prevents single point of failure and workload on a single system. The scheme is thus robust. Also it supports user revocation to prevent stale entry of data.
Keywords: access control, authentication, key distribution center, attribute based encryption, cloud storage
Edition: Volume 5 Issue 4, April 2016
Pages: 724 - 726
DOI: https://www.doi.org/10.21275/NOV162191
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, India, Volume 10 Issue 1, January 2021
Pages: 1729 - 1736Leveraging Cloud Object Storage Mechanisms for Analyzing Massive Datasets
Sarbaree Mishra
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 1850 - 1857Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms
Jeevan Manda
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Technology, India, Volume 12 Issue 12, December 2023
Pages: 2114 - 2119Zero Knowledge Proof Techniques in PAM Authentication
Sri Kanth Mandru
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 11 Issue 8, August 2022
Pages: 1549 - 1559Cybersecurity in Microservices Architectures: Protecting Distributed Retail Applications in Cloud Environments
Yash Jani, Arth Jani, Dhaval Gogri
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Information Technology, United States of America, Volume 11 Issue 3, March 2022
Pages: 1634 - 1641Adversarial Machine Learning: Attacks and Defense Mechanisms with Respect to AI Security
Rajashekhar Reddy Kethireddy