A new security and privacy framework for RFID in cloud computing
RFID is a leading technology that has been rapidly deployed in several daily life applications that require strong security and privacy mechanisms. However, RFID systems commonly have limited computational capacity and inefficient data management. There is a demanding urge to address these issues in the light of some mechanism which can make the technology excel. Cloud computing is one of the fastest growing segments of IT industry that provides cost effective solutions for handling and using data collected with RFID. As more and more information on companies and individuals is placed in the cloud, concerns are beginning to escalate about just how safe an environment it is. Therefore, while integrating RFID into the cloud, the security and privacy of the tag owner must be considered. Motivated by this, we first provide a new security and privacy model for RFID technology integrated to the cloud computing. In this model, we define the capabilities of the adversary and give the formal definitions. After that we propose a cloud-based RFID authentication protocol to illustrate our model. The protocol utilizes symmetric-key based cryptography. We prove that the protocol achieves destructive privacy according to our model.
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link
Citation : Kardas, S. Çelik, S., Bingöl, M.A., and Levi, A. (2014) A New Security and Privacy Framework for RFID in Cloud Computing. 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, Bristol, UK, December 2013, pp. 171-176.
Research Institute : Cyber Technology Institute (CTI)
Peer Reviewed : Yes