Distributed Access Control Scheme for Secure Data Storage in Cloud Environment with Unsigned Authentication

Download Now
Provided by: International Journal & Magazine of Engineering, Technology, Management And Research (IJMETMR)
Topic: Cloud
Format: PDF
Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Much of the data stored in clouds is highly sensitive, for example, medical records and social networks. Security and privacy are, thus, very important issues in cloud computing. In one hand, the user should authenticate itself before initiating any transaction, and on the other hand, it must be ensured that the cloud does not tamper with the data that is outsourced. User privacy is also required so that the cloud or other users do not know the identity of the user.
Download Now

Find By Topic