Cloud-based RFID Authentication

被引:0
|
作者
Xie, Wei [1 ]
Xie, Lei [2 ]
Zhang, Chen [1 ]
Zhang, Quan [1 ]
Tang, Chaojing [1 ]
机构
[1] Natl Univ Def Technol, Sch Elect Sci & Engn, Changsha, Hunan, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Jiangsu, Peoples R China
关键词
RFID; cloud computing; authentication; SEARCH PROTOCOL; MIDDLEWARE; SECURITY; SERVICE;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Along with the development of cloud computing, cloud-based RFID is receiving more and more attentions of researchers and engineers. However, there is no research in which cloud computing is applied to RFID authentication schemes. Most current works lay emphasis on functionalities, lacking considerations about security and privacy. Classical RFID authentication schemes fail to meet the special security and privacy requirements of cloud-based RFID. The basic postulates of traditional backend-sever-based RFID authentication, i.e. secure backend channel and entirely trustworthy database, are no longer natively tenable in cloud-based RFID scenarios. In this paper, a virtual private network agency is suggested to build secure backend channels and to provide readers with anonymous access to the cloud. The cloud database is structured as an encrypted hash table. The first cloud-based RFID authentication protocol preserving tag/reader privacy to database keepers is proposed. Comparing with classical schemes, the proposed scheme has advantages in deployment cost saving, pervasiveness of authentication, scalability of O(1) complexity to verify a tag, mobile reader holders' privacy preserving, and database security.
引用
收藏
页码:168 / 175
页数:8
相关论文
共 50 条
  • [21] xperbp: a cloud-based lightweight mutual authentication protocol
    Adeli, Morteza
    Bagheri, Nasour
    Sadeghi, Sadegh
    Kumari, Saru
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (04) : 1785 - 1802
  • [22] ECC-Based Authentication Scheme for Cloud-Based Robots
    Jain, Saurabh
    Nandhini, C.
    Doriya, Rajesh
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (02) : 1557 - 1576
  • [23] FACT: A Framework for Authentication in Cloud-Based IP Traceback
    Cheng, Long
    Divakaran, Dinil Mon
    Ang, Aloysius Wooi Kiak
    Lim, Wee Yong
    Thing, Vrizlynn L. L.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 604 - 616
  • [24] A New Authentication Scheme for Cloud-based Storage Applications
    Medhioub, Manel
    Hamdi, Mohamed
    Kim, Tai-Hoon
    [J]. SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 57 - 60
  • [25] A novel protocol for efficient authentication in cloud-based IoT devices
    Alam, Irfan
    Kumar, Manoj
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (10) : 13823 - 13843
  • [26] ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment
    Qingfeng Cheng
    Xinglong Zhang
    Jianfeng Ma
    [J]. Journal of Medical Systems, 2017, 41
  • [27] A novel protocol for efficient authentication in cloud-based IoT devices
    Irfan Alam
    Manoj Kumar
    [J]. Multimedia Tools and Applications, 2022, 81 : 13823 - 13843
  • [28] ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment
    Cheng, Qingfeng
    Zhang, Xinglong
    Ma, Jianfeng
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (03)
  • [29] Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol
    Fan, Kai
    Wang, Wei
    Wang, Yue
    Li, Hui
    Yang, Yintang
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [30] Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers
    Fu, Yue
    Au, Man Ho
    Du, Rong
    Hu, Haibo
    Li, Dagang
    [J]. 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 1209 - 1210