2011
DOI: 10.1109/tce.2011.6018903
|View full text |Cite
|
Sign up to set email alerts
|

Sharing cloud services: user authentication for social enhancement of home networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 42 publications
(19 citation statements)
references
References 60 publications
0
19
0
Order By: Relevance
“…The major issue here is to check the faithfulness of the cloud provider, i.e. how proficiently and safely the cloud provider will store the client data on the cloud, which has been explained by [26]. This issue can be solved either by using the public key encryption or by saving the information in cryptic form on the cloud, but the data stored on the cloud is very huge, and to encrypt it, we need a lot of preprocessing, but the capability of client to encrypt such amounts of huge data is very less because of limited processing capability.…”
Section: Data Integrity and Authenticationmentioning
confidence: 99%
“…The major issue here is to check the faithfulness of the cloud provider, i.e. how proficiently and safely the cloud provider will store the client data on the cloud, which has been explained by [26]. This issue can be solved either by using the public key encryption or by saving the information in cryptic form on the cloud, but the data stored on the cloud is very huge, and to encrypt it, we need a lot of preprocessing, but the capability of client to encrypt such amounts of huge data is very less because of limited processing capability.…”
Section: Data Integrity and Authenticationmentioning
confidence: 99%
“…But there is another layer of security here, because your device stores your authentication code in a secure memory and never exports it. Instead it uses a well-known cryptographic technique known as zero-knowledge-proof (ZKP) to authenticate you to a network based service where you are enrolled [36]- [38]. This serves two purposes -the private key generated by your device, from your biometric, never leaves your device.…”
Section: The Zen Of Zero-knowledge-proofmentioning
confidence: 99%
“…This field is a research topic in itself and there is much work on cancellable biometrics and associated techniques [37]. One solution is to combine the biometric with a device key, employing zero-knowledge-proof techniques to provide authentication beyond the device [38], [39].…”
Section: Authenticationmentioning
confidence: 99%