Kardaş, Süleyman and Çelik, Serkan and Bingöl, Muhammed Ali and Levi, Albert (2013) A new security and privacy framework for RFID in cloud computing. In: 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Bristol, UK
PDF
5095a171.pdf
Restricted to Registered users only
Download (183kB) | Request a copy
5095a171.pdf
Restricted to Registered users only
Download (183kB) | Request a copy
Official URL: http://dx.doi.org/10.1109/CloudCom.2013.30
Abstract
RFID is a leading technology that has been rapidly deployed in several daily life applications that require strong security and privacy mechanisms. However, RFID systems commonly have limited computational capacity and inefficient data management. There is a demanding urge to address these issues in the light of some mechanism which can make the technology excel. Cloud computing is one of the fastest growing segments of IT industry that provides cost effective solutions for handling and using data collected with RFID. As more and more information on companies and individuals is placed in the cloud, concerns are beginning to escalate about just how safe an environment it is. Therefore, while integrating RFID into the cloud, the security and privacy of the tag owner
must be considered. Motivated by this, we first provide a new security and privacy model for RFID technology integrated to the cloud computing. In this model, we define the capabilities of the adversary and give the formal definitions. After that we propose a cloud-based RFID authentication protocol to
illustrate our model. The protocol utilizes symmetric-key based cryptography. We prove that the protocol achieves destructive privacy according to our model.
Item Type: | Papers in Conference Proceedings |
---|---|
Divisions: | Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng. Faculty of Engineering and Natural Sciences |
Depositing User: | Albert Levi |
Date Deposited: | 08 Jan 2014 16:04 |
Last Modified: | 26 Apr 2022 09:13 |
URI: | https://research.sabanciuniv.edu/id/eprint/23598 |