Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Flexible Authentication with User Revocation for DAC in Cloud


Affiliations
1 Dr.MGR Educational & Research Institute University, India
2 Dr.MGR Educational & Research Institute University, Qatar
     

   Subscribe/Renew Journal


We suggest a decentralized access management theme for safe information storage and versatile authentication for file sharing. The cloud authorizes the credibility of the sequences while not revealing the user’s identity for storing information. There’s a feature of access management during which solely legal users will rewrite the file hold on in cloud. The theme provides user revocation that prevents replay attacks on file hold on within the cloud. Additionally the corrupted files will be recovered by string matching formula. Also the file owner will have log about when the file has been edited by other users.


Keywords

Access Control, Authentication, Access Policy, File Recovery, Activity Log.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 260

PDF Views: 1




  • Flexible Authentication with User Revocation for DAC in Cloud

Abstract Views: 260  |  PDF Views: 1

Authors

G. Keerthi
Dr.MGR Educational & Research Institute University, India
Golda Selia
Dr.MGR Educational & Research Institute University, Qatar

Abstract


We suggest a decentralized access management theme for safe information storage and versatile authentication for file sharing. The cloud authorizes the credibility of the sequences while not revealing the user’s identity for storing information. There’s a feature of access management during which solely legal users will rewrite the file hold on in cloud. The theme provides user revocation that prevents replay attacks on file hold on within the cloud. Additionally the corrupted files will be recovered by string matching formula. Also the file owner will have log about when the file has been edited by other users.


Keywords


Access Control, Authentication, Access Policy, File Recovery, Activity Log.