A Secure Secondary Backup Storage with an Isolated Authentication.
Kwangjin BaeIlsun YouKangbin YimTaeho SonPublished in: IMIS (2012)
Keyphrases
- user authentication
- authentication mechanism
- authentication scheme
- password authentication
- authentication protocol
- data encryption
- security mechanisms
- identity management
- security analysis
- key distribution
- factor authentication
- integrity verification
- security requirements
- secure manner
- security services
- smart card
- identity authentication
- data storage
- private key
- access control
- electronic payment
- public key encryption
- authentication systems
- key agreement protocol
- secure communication
- rights management
- security issues
- public key cryptography
- key agreement
- lightweight
- file system
- trusted third party
- secret key
- resource constrained
- high availability
- key management
- cloud computing
- encryption decryption
- biometric authentication
- security protocols
- data security
- storage systems
- security properties
- diffie hellman
- data protection