Abstract
Access control is processed on centralized form with key distributed center (KDC). Because of this data are affected if any one of the key gets attacks. To recover the data from the overall damage from attacks, providing attributes for the data in decentralized approach. Due to this attribute based access control for data in cloud storage. Secure the data storage in clouds, decentralized access control approach is introduced. Access control provides authentication for the user, in which only valid users are able to decrypt the stored information. User authentication and access control scheme are introduced in decentralized, which prevent replay attacks and supports modification on data stored in the cloud. Access control in clouds is gaining attention because it is important that only authorized users have to access to valid service. A huge amount of information is being stored in the cloud, and much of this is sensitive information. Clouds are being store sensitive information about patients to enable access to medical professionals, hospital staff, researchers, and policy makers. Decentralized approach and provides authentication without disclosing the identity of the users.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Journal of Information Technology & Software Engineering
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.