A Novel Architecture for Authentication of Data Stored Via Decentralized Access Control in Clouds

Cloud is something which provides uninterrupted services over the network by present in the remote location and cloud computing is manipulating or accessing application over a network also provides an infrastructure for storing the data. One of the most fundamental advantages is it will not require any piece of software on the users’ local system. However, it stances a major issue with concealment of those stored data. The reason behind it is the cloud servers are managed by some cloud provider are not fully trusted and the data may be sensitive and confidential which is stored in cloud so here a possible chance of data violation.

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Resource Details

Provided by:
International Journal of Advance Research in Science and Engineering (IJARSE)
Topic:
Cloud
Format:
PDF