用于云RFID认证的ECC证书

Elmakfalji Chaimae, Romadi Rahal, E. Abdellatif
{"title":"用于云RFID认证的ECC证书","authors":"Elmakfalji Chaimae, Romadi Rahal, E. Abdellatif","doi":"10.1109/CLOUDTECH.2016.7847699","DOIUrl":null,"url":null,"abstract":"Cloud computing is the access via internet to shared resources and services. Merging this technology with RFID enabled the improvement of the latter such as data storage and processing, and both allow to have intelligent environments and access services anytime and anywhere. But this fusion is the subject of some criticism concerning the data security and privacy. In this article we are interested in the authentication of tag / reader to the cloud interface and we propose a protocol using elliptic curve cryptography (ECC) to verify the identity of readers before issuing the certificate which authenticates the reader to tag, and then lets them access the cloud interface.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"ECC certificate for authentication in cloud-based RFID\",\"authors\":\"Elmakfalji Chaimae, Romadi Rahal, E. Abdellatif\",\"doi\":\"10.1109/CLOUDTECH.2016.7847699\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is the access via internet to shared resources and services. Merging this technology with RFID enabled the improvement of the latter such as data storage and processing, and both allow to have intelligent environments and access services anytime and anywhere. But this fusion is the subject of some criticism concerning the data security and privacy. In this article we are interested in the authentication of tag / reader to the cloud interface and we propose a protocol using elliptic curve cryptography (ECC) to verify the identity of readers before issuing the certificate which authenticates the reader to tag, and then lets them access the cloud interface.\",\"PeriodicalId\":133495,\"journal\":{\"name\":\"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CLOUDTECH.2016.7847699\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CLOUDTECH.2016.7847699","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

云计算是通过互联网访问共享的资源和服务。将该技术与RFID相结合,可以改善后者,例如数据存储和处理,并且可以随时随地拥有智能环境和访问服务。但这种融合在数据安全和隐私方面受到了一些批评。在本文中,我们对标签/阅读器对云接口的身份验证感兴趣,并提出了一个使用椭圆曲线加密(ECC)的协议,在颁发证书之前验证阅读器对标签的身份验证,然后允许它们访问云接口。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
ECC certificate for authentication in cloud-based RFID
Cloud computing is the access via internet to shared resources and services. Merging this technology with RFID enabled the improvement of the latter such as data storage and processing, and both allow to have intelligent environments and access services anytime and anywhere. But this fusion is the subject of some criticism concerning the data security and privacy. In this article we are interested in the authentication of tag / reader to the cloud interface and we propose a protocol using elliptic curve cryptography (ECC) to verify the identity of readers before issuing the certificate which authenticates the reader to tag, and then lets them access the cloud interface.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
ECC certificate for authentication in cloud-based RFID Taking account of trust when adopting cloud computing architecture New technique for face recognition based on Singular Value Decomposition (SVD) A collaborative framework for intrusion detection (C-NIDS) in Cloud computing Cloud security and privacy model for providing secure cloud services
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1