Secure Cloud Storage with Anonymous Authentication using Decentralized Access Control

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2

Abstract

Security and privacy protection in clouds are challenging. Efficient search in clouds is also an important concern. A new decentralized access control scheme that supports anonymous authentication for secure data storage is proposed. In this scheme without knowing the user’s identity before storing the data the cloud verifies the authenticity. This scheme also helps in creation, modification and reading data stored in cloud and also prevents replay attacks.

Authors and Affiliations

Keywords

Related Articles

Opportunities and Challenges for Use and Integration of Information Communication Technology in Management of Public Secondary Schools in Bungoma South District, Kenya Opportunities and Challenges for Use and Integration of Information Communication Technology in Management of Public Secondary Schools in Bungoma South District, Kenya

World over, most sectors have embraced information communication technology (ICT) as the preferred tool of choice for best management practices regarding service delivery in this 21st century. Despite the Kenya governmen...

Double Circuit Transmission Line Fault Distance Location Using Wavelet Transform and WMM Technique

Distance relays used for protection of transmission lines have problems of under-reach, over-reach and mal-operation due to high impedance faults. Further the problem is compounded when distance relays are used for prote...

Diagnosis of Deep Vein Thrombosis (DVT) using Colour Duplex Imaging (CDI) versus D Dimer Test.

Several diagnostic strategies using ultrasound imaging, measurement of D-dimer, and assessment of clinical probability of disease have proved safe in patients with suspected deep-vein thrombosis,. The purpose of this rev...

Homogenization and Parametric Consequence of Warm Deep Drawing Process for 1050A Aluminum Alloy: Validation through FEA

In this present work, a statistical approach based on Taguchi Techniques and finite element analysis were adopted to determine the parametric consequence on the formability of cup using warm deep drawing process. The pro...

Importance of Section 66A in Information Technology Act 2000

Section 66A defines the punishment for sending

Download PDF file
  • EP ID EP356171
  • DOI -
  • Views 82
  • Downloads 0

How To Cite

(2015). Secure Cloud Storage with Anonymous Authentication using Decentralized Access Control. UNKNOWN, 4(2), -. https://europub.co.uk/articles/-A-356171