IJSTE

CALL FOR PAPERS : December-2022

Submission Last Date
25-December-22
Submit Manuscript Online

FOR AUTHORS

FOR REVIEWERS

ARCHIEVES

DOWNLOADS

Open Access



CopyScape
Creative Commons License

An Algorithm Access Control Mechanism with Authentication of Anonymous user and Deduplication of Data in Decentralized Clouds


Author(s):

Imran Dilawar Tamboli , MITAOE, Alandi; Prof. Ranjana R. Badre, MITAOE, Alandi

Keywords:

Cloud Storage, Access control, Key Distribution Centre, Data Deduplication

Abstract:

The internet framework and thousands of users are dealing with cloud for sensitive information over cloud computing nowadays providing exciting features due to the services. In terms of security and the access control mechanisms cloud server management is challenging task due to sensitivity of data deploy in clouds. For the Key Distribution and also data administration when a course of fine grained access control on data is demanded by the users and the scaling factor must be well enough the cloud server suffers with the processing overhead. To maintain scalability, data confidentiality as well as fine graininess of access control mechanisms at the same time on the risk of uncertainty is the main issues. As based on quality of data the system provides and generates access policies and then afterward gives severs by maintaining the security and encryption of data the permission of data owner and modifier to untrusted cloud severs by maintaining the security and encryption of data. By taking combination of decentralized key policy and attribute Based Encryption (KP-ABE) this thing can be overcome. The proposed system will be robust and secure. The technique referred is known as Data DE duplication, also removal of duplicate copies of continuously repeating data is necessary, one of the most important data compression technique widely used in cloud storage to recover the space and bandwidth of cloud. A big support is provided by using convergent encryption technique to the protection of the confidentiality of sensitive data by performing authorized duplicate check in hybrid cloud storage architectures.


Other Details:

Manuscript Id :IJSTEV2I11333
Published in :Volume : 2, Issue : 11
Publication Date: 01/06/2016
Page(s): 890-895
Download Article

IMPACT FACTOR

4.753

NEWS & UPDATES

Submit Article

Dear Authors, You can submit your article to our journal at the following link: http://www.ijste.org/Submit

Impact Factor

The Impact Factor of our Journal is 4.753 (Year - 2016)
3.905 (Year - 2015) 2.895(Year -2014)

Click Here

Submit Payment Online

Dear Authors, Now you can submit the payment receipt to our journal online at the following link: index.php?p=Payment

1

1

GLOBAL INDEXING



















Computer Science Directory. We are listed under Computer Research Institutes category

Share on Social media

Home | Privacy Policy | Terms & Conditions | Refund Policy | Feedback | Contact Us
Copyright © 2014 ijste.org All rights reserved