IJIRST (International Journal for Innovative Research in Science & Technology)ISSN (online) : 2349-6010

 International Journal for Innovative Research in Science & Technology

Decentralized Access Control with Unidentified Authentication for Information Security in Cloud Computing


Print Email Cite
International Journal for Innovative Research in Science & Technology
Volume 2 Issue - 6
Year of Publication : 2015
Authors : Siva Rama Prasad Kollu

BibTeX:

@article{IJIRSTV2I6039,
     title={Decentralized Access Control with Unidentified Authentication for Information Security in Cloud Computing},
     author={Siva Rama Prasad Kollu},
     journal={International Journal for Innovative Research in Science & Technology},
     volume={2},
     number={6},
     pages={79--82},
     year={},
     url={http://www.ijirst.org/articles/IJIRSTV2I6039.pdf},
     publisher={IJIRST (International Journal for Innovative Research in Science & Technology)},
}



Abstract:

Cloud computing has is a popular design in managing world to back up large volumetric details using cluster of commodity computer systems. It is the newest effort in offering and managing computing as a service. The decentralized access control scheme distributes the data stored in cloud to user. Valid user can only access the stored information. The valid users attribute satisfies the access policy that attached to the cipher text. In the proposed decentralized approach, the technique does not authenticate users. When the users have matching set of attributes, can they decrypt the information stored in the cloud the set of attributes possessed by the revoked user. This provides user revocation and prevents replay attacks. Decentralized access control scheme can distribute secret keys for valid user in set of attribute. If the user is not authorized individually decentralized access control distribute authorized secret keys to user in set of attribute such that only that user can encrypt the stored data using its secret key. The proposed algorithm is Token Verification algorithm. Using this algorithm the creator or author of the data can verify who are all modifying the document. The algorithm provides more security in access control and authentication. Moreover, our authentication and access management theme is suburbanized and sturdy, in contrast to different access management schemes designed for clouds that square measure centralized.


Keywords:

Decentralized Access Control Authentication


Download Article