期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2015
卷号:3
期号:1
DOI:10.15680/ijircce.2015.0301043
出版社:S&S Publications
摘要:This paper details about various methods prevailing in literature of anonymous authenticationmechanisms for data stored in clouds. It is a Decentralized access of system in which every system have the accesscontrol of data . The Cloud which is a Secured storage area where the anonymous authentication is used, so that onlythe permitted users can be accessed. Decrypting of data can be viewed only by a valid users and can also storedinformation only by Valid users. This Scheme prevents Replay attack which mean Eaves Dropping can be avoided,Support Creation of data inside storage, Modifying the data by unknown users , and Reading data stored in Cloud. Usercan revocate the data only by addressing through the cloud. The authentication and accessing the Cloud is Robust,Hence Overall Communication Storage are been developed by comparing to the Centralized approaches. This paperwould promote a lot of research in the area of Anonymous Authentication.