A Secure IoT-Based Authentication System in Cloud Computing Environment.
Hsiao-Ling WuChin-Chen ChangYao-Zhu ZhengLong-Sheng ChenChih-Cheng ChenPublished in: Sensors (2020)
Keyphrases
- cloud computing
- cloud computing environment
- identity management
- security issues
- security mechanisms
- computing resources
- authentication mechanism
- data center
- authentication scheme
- data encryption
- key distribution
- data management
- distributed computing
- user authentication
- service providers
- password authentication
- key management
- factor authentication
- business models
- security analysis
- authentication protocol
- integrity verification
- computing platform
- security requirements
- rights management
- cloud services
- trusted computing
- web services
- smart card