Authentication protocol for distributed cloud computing circumstance with IoT-enabled devices
Wu, F.
; Li, X.
; Xu, L.
; Sangaiah, A. K.
;
Rodrigues, J. R.
IEEE Consumer Electronics Magazine Vol. 7, Nº 6, pp. 38 - 44, November, 2018.
ISSN (print): 2162-2248
ISSN (online): 2162-2256
Scimago Journal Ranking: 0,42 (in 2018)
Digital Object Identifier: 10.1109/MCE.2018.2851744
Abstract
As a popular conception, the Internet of Things (IoT) allows people to access more and more data around the world. However, a concern arises of how to store the large amount of data created through this technology. To solve the problem, cloud computing services are brought in as a critical technology. However, it is necessary to guard the private information that is collected via IoT devices and stored in distributed cloud servers. Though authentication schemes are provided, many security weaknesses exist. We present an advanced authentication scheme for cloud computing using only hash functions and exclusive or computations that are suitable for IoT devices, which tend to have limited computation and storage abilities.