आईएसएसएन: 2165- 7866
Rathna D, Sankaragomathi R, Thulasika S and Thiruselvan P
Access control is processed on centralized form with key distributed center (KDC). Because of this data are affected if any one of the key gets attacks. To recover the data from the overall damage from attacks, providing attributes for the data in decentralized approach. Due to this attribute based access control for data in cloud storage. Secure the data storage in clouds, decentralized access control approach is introduced. Access control provides authentication for the user, in which only valid users are able to decrypt the stored information. User authentication and access control scheme are introduced in decentralized, which prevent replay attacks and supports modification on data stored in the cloud. Access control in clouds is gaining attention because it is important that only authorized users have to access to valid service. A huge amount of information is being stored in the cloud, and much of this is sensitive information. Clouds are being store sensitive information about patients to enable access to medical professionals, hospital staff, researchers, and policy makers. Decentralized approach and provides authentication without disclosing the identity of the users.