IJSEA Volume 5 Issue 2

A Survey on Different Techniques Used in Decentralized Cloud Computing

Mohini Tanaji Patil,
10.7753/IJSEA0502.1007
keywords : cloud security, auditing,security,ciphertext.

PDF
This paper proposes various methods for anonymous authentication for data stored in cloud. Cloud verifies the authenticity of the series without knowing the user?s identity before storing data. This paper also has the added feature of access control in which only valid users are able to decrypt the stored information. These schemes also prevents replay attacks and supports creation, modification, and reading data stored in the cloud. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches .The aim of this paper is to cover many security issues arises in cloud computing and different schemes to prevent security risks in cloud. Storage-as-a-service (Saas) offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloud-based storage schemes that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust between them. This Paper provides different authentication techniques and algorithms for cloud security.
@artical{m522016ijsea05021007,
Title = "A Survey on Different Techniques Used in Decentralized Cloud Computing",
Journal ="International Journal of Science and Engineering Applications (IJSEA)",
Volume = "5",
Issue ="2",
Pages ="92 - 94",
Year = "2016",
Authors ="Mohini Tanaji Patil, "}