AUTHENTICATION OF DATA STORAGE USING DECENTRALIZED ACCESS CONTROL

  • Unique Paper ID: 142542
  • Volume: 2
  • Issue: 3
  • PageNo: 151-156
  • Abstract:
  • Cloud computing is a rising computing standard in which assets of the computing framework are given as a service over the Internet.In this paper, we propose the secure data storage in clouds for a new decentralized access. The cloud verifies the authenticity of the series without knowing the user’s identity in the proposed scheme. Our feature is that only valid users can able to decrypt the stored information. It prevents from the replay attack. This scheme supports creation, modification, and reading the data stored in the cloud and also provide the decentralized authentication and robust. It can be comparable to centralized schemes for the communication of data, computation of data, and storage of data.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{142542,
        author = {Battaladinne Charan and V. Sujatha},
        title = {AUTHENTICATION OF DATA STORAGE USING DECENTRALIZED ACCESS CONTROL},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {2},
        number = {3},
        pages = {151-156},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=142542},
        abstract = {Cloud computing is a rising computing standard in which assets of the computing framework are given as a service over the Internet.In this paper, we propose the secure data storage in clouds for a new decentralized access. The cloud verifies the authenticity of the series without knowing the user’s identity in the proposed scheme. Our feature is that only valid users can able to decrypt the stored information. It prevents from the replay attack. This scheme supports creation, modification, and reading the data stored in the cloud and also provide the decentralized authentication and robust. It can be comparable to centralized schemes for the communication of data, computation of data, and storage of data.},
        keywords = {Access control, authentication of user, attribute-based signatures, attribute-based encryption, and cloud storage.},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 2
  • Issue: 3
  • PageNo: 151-156

AUTHENTICATION OF DATA STORAGE USING DECENTRALIZED ACCESS CONTROL

Related Articles