Authentication Protocol for Distributed Cloud Computing An explanation of the security situation for Internet-of-Things-enabled devices

被引:27
|
作者
Wu, Fan [1 ]
Li, Xiong [2 ]
Xu, Lili [3 ]
Sangaiah, Arun Kumar [4 ]
Rodrigues, Joel J. P. C. [5 ,6 ,7 ,8 ]
机构
[1] Xiamen Inst Technol, Xiamen, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Zhuzhou, Peoples R China
[3] Xiamen Univ, Xiamen, Peoples R China
[4] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
[5] Natl Inst Telecommun, Santa Rita Do Sapucai, Brazil
[6] Inst Telecommun, Coimbra, Portugal
[7] ITMO Univ, St Petersburg, Russia
[8] Univ Fortaleza, Fortaleza, Ceara, Brazil
基金
中国国家自然科学基金;
关键词
MULTISERVER ARCHITECTURE; SENSOR NETWORKS; KEY AGREEMENT; SMART CARDS; EFFICIENT; SCHEME; ENVIRONMENT;
D O I
10.1109/MCE.2018.2851744
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a popular conception, the Internet of Things (IoT) allows people to access more and more data around the world. However, a concern arises of how to store the large amount of data created through this technology. To solve the problem, cloud computing services are brought in as a critical technology. However, it is necessary to guard the private information that is collected via IoT devices and stored in distributed cloud servers. Though authentication schemes are provided, many security weaknesses exist. We present an advanced authentication scheme for cloud computing using only hash functions and exclusive or computations that are suitable for IoT devices, which tend to have limited computation and storage abilities. © 2012 IEEE.
引用
收藏
页码:38 / 44
页数:7
相关论文
共 50 条
  • [31] Cloud-Based Remote RFID Authentication for Security of Smart Internet of Things Applications
    Ahmed, Mohammed Imtyaz
    Kannan, G.
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2021, 20
  • [32] IoT enabled cancer prediction system to enhance the authentication and security using cloud computing
    Anuradha, M.
    Jayasankar, T.
    Prakash, N. B.
    Sikkandar, Mohamed Yacin
    Hemalakshmi, G. R.
    Bharatiraja, C.
    Britto, A. Sagai Francis
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 80
  • [33] Cloud-Based Remote RFID Authentication for Security of Smart Internet of Things Applications
    Ahmed, Mohammed Imtyaz
    Kannan, G.
    Journal of Information and Knowledge Management, 2021, 20 (supp01):
  • [34] Trust management for internet of things using cloud computing and security in smart cities
    Alazab, Mamoun
    Manogaran, Gunasekaran
    Montenegro-Marin, Carlos Enrique
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (03): : 1765 - 1777
  • [35] Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing
    Sehgal, Vivek Kumar
    Patrick, Anubhav
    Soni, Ashutosh
    Rajput, Lucky
    INTELLIGENT DISTRIBUTED COMPUTING, 2015, 321 : 251 - 263
  • [36] Trust management for internet of things using cloud computing and security in smart cities
    Mamoun Alazab
    Gunasekaran Manogaran
    Carlos Enrique Montenegro-Marin
    Cluster Computing, 2022, 25 : 1765 - 1777
  • [37] Trust management for internet of things using cloud computing and security in smart cities
    Alazab, Mamoun
    Manogaran, Gunasekaran
    Montenegro-Marin, Carlos Enrique
    Cluster Computing, 2022, 25 (03) : 1765 - 1777
  • [38] CRITICAL REVIEW OF SECURITY ISSUES OF INTERNET OF THINGS UNDER CLOUD COMPUTING ENVIRONMENT
    Kaur, Mandeep
    Kakkar, Sanchi
    Singh, V. P.
    ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2019, 18 (08): : 627 - 636
  • [39] Secure Authentication and Key Agreement Protocol for Cloud-Assisted Industrial Internet of Things
    Hu, Huanhuan
    Liao, Longxia
    Zhao, Junhui
    ELECTRONICS, 2022, 11 (10)
  • [40] An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
    Kumar, Syam P.
    Subramanian, R.
    Selvam, Thamizh D.
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 214 - 219