International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 159 - Number 3 |
Year of Publication: 2017 |
Authors: Imran D. Tamboli, Ranjana R. Badre |
10.5120/ijca2017912884 |
Imran D. Tamboli, Ranjana R. Badre . An Analysis of Access Control Mechanism with Authentication of Anonymous user and Deduplication of Data in Decentralized Clouds. International Journal of Computer Applications. 159, 3 ( Feb 2017), 12-18. DOI=10.5120/ijca2017912884
The internet framework and thousands of users are dealing with cloud for sensitive information over cloud computing nowadays providing exciting features due to the services .In terms of security and the access control mechanisms cloud server management is challenging task due to sensitivity of data deploy in clouds. For the Key Distribution and also data administration when a course of fine grained access control on data is demanded by the users and the scaling factor must be well enough the cloud server suffers with the processing overhead. To maintain scalability, data confidentiality as well as fine graininess of access control mechanisms at the same time on the risk of uncertainty is the main issues. As based on quality of data the system provides and generates access policies and then afterward gives severs by maintaining the security and encryption of data the permission of data owner and modifier to unauthorized cloud severs by maintaining the security and encryption of data. By taking combination of decentralized key policy and attribute Based Encryption (KP-ABE) this thing can be overcome. The proposed system will be robust and secure. The technique referred is known as Deduplication of data (removal of repeated copies), also removal of copies of continuously repeating data is necessary, one of the most important data compression technique widely used in cloud storage to recover the space and bandwidth of cloud. A big support is provided by using convergent encryption technique to the protection of the confidentiality of sensitive data by performing authorized duplicate check in hybrid cloud storage architectures.