z-logo
open-access-imgOpen Access
Incognito-authentication for preserving information on cloud with distributed approach control
Author(s) -
Pramod Varma,
R. Balakrishna,
Aparna Ram,
A. Manikandan
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i2.21.12379
Subject(s) - cloud computing , computer science , credibility , authentication (law) , conversation , access control , control (management) , computer security , artificial intelligence , linguistics , philosophy , political science , law , operating system
A new distributed approach control methods which are considered on preserve information repository in clouds in order to back incognito authentication. In the current method, the cloud checks the credibility of the series by not getting the user’s integrity formerly saving the information. In this work we developed a method which include major aspects like approach control for all authentic users who can able to decode the preserved knowledge. This method blocks epitomize barrage along with backing formation, alteration as well as educating information reposted in the cloud. We moreover deal customer repudiation, verification and approach control methods are distributed and vigorous, unlike alternative approach control methods created for clouds which are unify. The conversation, calculation along with repository aloft which is as good as to unify access. 

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here