Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices.
Fan WuXiong LiLili XuArun Kumar SangaiahJoel J. P. C. RodriguesPublished in: IEEE Consumer Electron. Mag. (2018)
Keyphrases
- cloud computing
- authentication protocol
- cloud computing environment
- distributed computing
- big data
- rfid tags
- lightweight
- security issues
- computing infrastructure
- smart card
- computing resources
- security protocols
- mobile devices
- computing platform
- data center
- cloud storage
- service providers
- security analysis
- data management
- rfid technology
- future internet
- cloud infrastructure
- distributed systems
- low cost
- public key
- secret key
- distributed environment
- load balancing
- security mechanisms
- cloud services
- virtual machine
- computing environments
- computer networks
- peer to peer
- security requirements
- mobile services
- mobile computing
- cost effective