Access Control
Cloudillo’s access control and permission systems for protecting resources while maintaining user privacy and enabling secure resource sharing across the decentralized network.
Core Subsystems
- Access Control & Resource Sharing - Token-based authentication and authorization mechanisms
- ABAC Permissions - Attribute-based access control (ABAC) system for fine-grained permissions
Key Concepts
When a user wants to access a resource stored on another node, Cloudillo uses cryptographic tokens to grant access without requiring direct trust between storage providers. This process is designed to be seamless, requiring no additional user interaction while maintaining full decentralization.