AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments.
Clemens ZeidlerMuhammad Rizwan AsgharPublished in: CoRR (2018)
Keyphrases
- data storage
- encrypted data
- user authentication
- sensitive data
- security analysis
- data management
- authentication protocol
- encryption scheme
- database management systems
- relational database systems
- encryption decryption
- storage media
- third party
- column oriented
- key exchange
- data integrity
- smart card
- b tree
- diffie hellman
- encryption algorithm
- authentication scheme
- real world
- highly dynamic
- data confidentiality
- standard model
- database
- data analysis
- data warehouse
- cloud computing
- data security
- flash memory
- privacy preserving
- security mechanisms
- security policies
- data access