Header menu link for other important links
X
Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices
Wu F, Li X, Xu L, , Rodrigues J.J.P.C.
Published in Institute of Electrical and Electronics Engineers (IEEE)
2018
Volume: 7
   
Issue: 6
Pages: 38 - 44
Abstract
As a popular conception, the Internet of Things (IoT) allows people to access more and more data around the world. However, a concern arises of how to store the large amount of data created through this technology. To solve the problem, cloud computing services are brought in as a critical technology. However, it is necessary to guard the private information that is collected via IoT devices and stored in distributed cloud servers. Though authentication schemes are provided, many security weaknesses exist. We present an advanced authentication scheme for cloud computing using only hash functions and exclusive or computations that are suitable for IoT devices, which tend to have limited computation and storage abilities. © 2012 IEEE.
About the journal
JournalData powered by TypesetIEEE Consumer Electronics Magazine
PublisherData powered by TypesetInstitute of Electrical and Electronics Engineers (IEEE)
ISSN2162-2248
Open Access0