RFID-based Electronic Identity Security Cloud Platform in Cyberspace
نویسندگان
چکیده
With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyber personal identity, and designs and realizes a strong and pervasive security cloud service platform, and discusses key technology including security authentication mechanism for the electronic identity card, super high frequency RFID with eID cards, multilevel privacy protection mechanism, security cloud service, security isolation and single-oriented transmission, and boundary security gateway protection, and it can well apply to personal identity management with virtual roles of citizens in cyberspace such as E-Government and E-Business, and the electronic identity security platform has been primary implemented and achieved good effects in actual applications.
منابع مشابه
RFID Factor Authentication Application For Trusted Identities in Cyberspace
There are over 2.2 billion Internet users around the world as of December 31 2011, according to the Internet World Stats (IWS) [1]. Online service is an important driving force behind many of today’s Web 2.0 and cloud computing applications. For security and privacy concerns, authentication is utilized by all online services that involve online transactions and restricted information access. Au...
متن کاملAn interoperable internet scale solution for RFID network security Citation
Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for RFID networks is proposed. The IISS framework performs authentication and authorization based on an aggregation of business rules, enterprise information, and RFID tag informa...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملRFID-based decision support within maintenance management of urban tunnel systems
Efficiently, tracking information related to components, materials and equipment from the production/construction phase to operation and maintenance is a challenge in the industries. The industry environment is a natural fit for generating and utilizing instance-level data for decision support. Advanced electronic identification and data storage technologies e.g. radio frequency identification ...
متن کاملThe impact of Cloud Computing in the banking industry resources
Today, one of the biggest problems that gripped the banking sphere, the high cost of implementing advanced technologies and the efficient use of the hardware. Cloud computing is the use of shared services on the Internet provides a large role in developing the banking system, without the need for operating expenses including staffing, equipment, hardware and software Reducing the cost of implem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JNW
دوره 7 شماره
صفحات -
تاریخ انتشار 2012