अमूर्त

A Survey on Decentralized Access Control Strategies for Data Stored in Clouds

J.Ganeshkumar, N.Rajesh, J.Elavarasan, Prof.M.Sarmila, Prof.S.Balamurugan

This paper details about various methods prevailing in literature of anonymous authentication mechanisms for data stored in clouds. It is a Decentralized access of system in which every system have the access control of data . The Cloud which is a Secured storage area where the anonymous authentication is used, so that only the permitted users can be accessed. Decrypting of data can be viewed only by a valid users and can also stored information only by Valid users. This Scheme prevents Replay attack which mean Eaves Dropping can be avoided, Support Creation of data inside storage, Modifying the data by unknown users , and Reading data stored in Cloud. User can revocate the data only by addressing through the cloud. The authentication and accessing the Cloud is Robust, Hence Overall Communication Storage are been developed by comparing to here the Centralized approaches. This paper would promote a lot of research in the area of Anonymous Authentication.

अस्वीकृति: इस सारांश का अनुवाद कृत्रिम बुद्धिमत्ता उपकरणों का उपयोग करके किया गया है और इसे अभी तक समीक्षा या सत्यापित नहीं किया गया है।

में अनुक्रमित

Index Copernicus
Academic Keys
CiteFactor
Cosmos IF
RefSeek
Hamdard University
World Catalogue of Scientific Journals
International Innovative Journal Impact Factor (IIJIF)
International Institute of Organised Research (I2OR)
Cosmos

और देखें