الفهرس | Only 14 pages are availabe for public view |
Abstract A new model was presented to obtain authentication for decentralized and prevent anonymous breakthrough the system. In this paper, the proposed method did not allow for users to enter the cloud until detecting the identity of this user. The identity detective is done by iris recognition that achieved high level of security. In this study, the attributes and access policy are hidden of the user. It is necessary to inform that the cloud did not know the identity of the users to store the information, but it only verifies the user credentials. A proposal model was suggested to overcome the obstacles of threats in the cloud which are identified on decentralized access. This model provided a high level of security and authentication by using iris as a condition to enter the cloud and then execute the encryption and decryption process. Comparing with others models, the results showed an increase the security ratio to prevent the attackers and hackers. This model provides a high level of security and reliability through using iris recognition as a condition to enter the cloud and achieving the encryption / decryption process. |