Privacy Preserving in Clouds By Using Decentralized Approach
Keywords:
Access control, Authentication, Secure hash algorithm, pailler algorithmAbstract
Cloud storage provides the on demand high quality hardware and software services so it will reduces
the burden of hardware or software management locally .Even though cloud storage having so many benefits like on
demand service ,pay as you use ,ease of access and maintainability ,encourages low investment etc one major issue
that relinquishing user to go through cloud storage is security of remotely stored data specially in case of public cloud.
To address this problem in this paper we are introducing a decentralized and distributed access of data .Here we are
maintaining more than one Key distribution centre (KDC) to distribute secrete keys and attributes to the users. One
KDC at a given time dedicated to a single user to avoid collusion .And to add even more security, we are taking the
image file then converting that into plain text ,this plain text will be finally converted into cipher text using 16 bit
Advanced encryption algorithm(AES) before giving to the cloud storage. In this scheme using Secure Hash algorithm
for authentication purpose, SHA is the one of several cryptographic hash functions, most often used to verify that a
file has been unaltered.


