Author : A.BhagyaLakshmi 1
Date of Publication :7th December 2016
Abstract: Cloud provides most of the services to its customers on demand via internet which are expected to be always on and have a critical nature. But before the customer or user gains permission to access the cloud service, the user must me authenticated and authorized by the cloud server. There are many ways where a user is been provided with authorization to access the cloud services. Once the user is provided with the authorization for a particular period of time (day or week or month or year) accessibility of the services are provided to the users. The revocation procedure is triggered at the end of the time period. This paper brings out a survey of various ways of revocation scheme which are used for accessing the cloud services. Compared with various revocable procedures such as attribute encryption and certificate encryption which are based on the public key cryptosystems, our mechanism can significantly improve the efficiency of user revocation using the identity. ID-based revocation possibly removes the use of public key infrastructure (PKI) and certification authorization which involves an online assistance to get authorized for accessing the services of cloud.
Reference :