Cloud-based RFID Authentication

被引:0
|
作者
Xie, Wei [1 ]
Xie, Lei [2 ]
Zhang, Chen [1 ]
Zhang, Quan [1 ]
Tang, Chaojing [1 ]
机构
[1] Natl Univ Def Technol, Sch Elect Sci & Engn, Changsha, Hunan, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Jiangsu, Peoples R China
关键词
RFID; cloud computing; authentication; SEARCH PROTOCOL; MIDDLEWARE; SECURITY; SERVICE;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Along with the development of cloud computing, cloud-based RFID is receiving more and more attentions of researchers and engineers. However, there is no research in which cloud computing is applied to RFID authentication schemes. Most current works lay emphasis on functionalities, lacking considerations about security and privacy. Classical RFID authentication schemes fail to meet the special security and privacy requirements of cloud-based RFID. The basic postulates of traditional backend-sever-based RFID authentication, i.e. secure backend channel and entirely trustworthy database, are no longer natively tenable in cloud-based RFID scenarios. In this paper, a virtual private network agency is suggested to build secure backend channels and to provide readers with anonymous access to the cloud. The cloud database is structured as an encrypted hash table. The first cloud-based RFID authentication protocol preserving tag/reader privacy to database keepers is proposed. Comparing with classical schemes, the proposed scheme has advantages in deployment cost saving, pervasiveness of authentication, scalability of O(1) complexity to verify a tag, mobile reader holders' privacy preserving, and database security.
引用
收藏
页码:168 / 175
页数:8
相关论文
共 50 条
  • [1] ECC certificate for authentication in Cloud-based RFID
    Chaimae, Elmakfalji
    Rahal, Romadi
    Abdellatif, El Afia
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 200 - 203
  • [2] Secure Improved Cloud-Based RFID Authentication Protocol
    Abughazalah, Sarah
    Markantonakis, Konstantinos
    Mayes, Keith
    [J]. DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 147 - 164
  • [3] Cloud-based Lightweight RFID Mutual Authentication Protocol
    Fan, Kai
    Luo, Qi
    Li, Hui
    Yang, Yintang
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 333 - 338
  • [4] A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems
    Fan, Kai
    Zhu, Shanshan
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    [J]. IEEE NETWORK, 2019, 33 (02): : 44 - 49
  • [5] A Cloud-Based Authentication Protocol for RFID Supply Chain Systems
    Iuon-Chang Lin
    Hung-Huei Hsu
    Chen-Yang Cheng
    [J]. Journal of Network and Systems Management, 2015, 23 : 978 - 997
  • [6] A Cloud-Based Authentication Protocol for RFID Supply Chain Systems
    Lin, Iuon-Chang
    Hsu, Hung-Huei
    Cheng, Chen-Yang
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2015, 23 (04) : 978 - 997
  • [7] A Cloud-based RFID Authentication Protocol with Insecure Communication Channels
    Xiao, Hannan
    Alshehri, Awatif Ali
    Christianson, Bruce
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 332 - 339
  • [8] Cloud-based lightweight secure RFID mutual authentication protocol in IoT
    Fan, Kai
    Luo, Qi
    Zhang, Kuan
    Yang, Yintang
    [J]. INFORMATION SCIENCES, 2020, 527 : 329 - 340
  • [9] Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud
    Dong, Qingkuan
    Tong, Jiaqing
    Chen, Yuan
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [10] Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV
    Fan, Kai
    Jiang, Wei
    Luo, Qi
    Li, Hui
    Yang, Yintang
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (01): : 193 - 209