2013 IEEE 5th International Conference on Cloud Computing Technology and Science 2013
DOI: 10.1109/cloudcom.2013.30
|View full text |Cite
|
Sign up to set email alerts
|

A New Security and Privacy Framework for RFID in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Cloud databases provide scalability, high availability, optimized resource allocation and multi-tenancy [13]. Using a unified cloud database empowers a single authentication system to more effectively manage pricing, events, reduces inventory losses, expands service offerings, and provides entire RFID infrastructures using a single system [14].…”
Section: B System Databasementioning
confidence: 99%
“…Cloud databases provide scalability, high availability, optimized resource allocation and multi-tenancy [13]. Using a unified cloud database empowers a single authentication system to more effectively manage pricing, events, reduces inventory losses, expands service offerings, and provides entire RFID infrastructures using a single system [14].…”
Section: B System Databasementioning
confidence: 99%
“…Radio frequency identification (RFID) is one of the key technologies for Internet of Things (IoT), 1 which has the powerful capabilities in automatic identification, localization, and access control of the objects; 2 thus, RFID-based technologies have been widely used in various daily applications such as payment, access control, ticketing, and e-passport that require strong security and privacy mechanisms. 3 The integration of RFID technology and wireless communication technology makes it superior to the bar code technology. However, the data privacy and the user’s information privacy problems are very serious.…”
Section: Introductionmentioning
confidence: 99%
“…However, the cost of implementing this protocol is relatively high due to the need of deploying a VPN agency to secure the communication channel between the reader and the cloud server. In the same year Kardas, Celik, Bingol and Levi [4] published another security and privacy RFID mutual authentication protocol was published which uses cloud services to provide system availability and scalability. The authors were concerned whether the confidentiality and privacy properties can be maintained with an untrusted cloud provider.…”
Section: Introductionmentioning
confidence: 99%