Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

ثبت نشده
چکیده

Cloud based RFID authentication is becoming a large area of interest among researchers and engineers these days. However, there is not much attention given to the RFID authentication concern. Most of the work done on this issue till now has its focus on RFID functionality without considering security and privacy. Classical RFID authentication schemes do not meet the security and privacy requirements of cloud based RFID. Main features available in traditional backend-server-based RFID authentication are secure backend channels and purely trustworthy database, which are not available when moved to cloud based scenarios. Here the concept is implemented on employee management system. Many organizations now days wants have a high-tech employee management system using which a salary, attendance and location of a particular employee within an organization can be easily find out. An organization invests a large amount of money for developing and maintaining its own software and system. As compared to traditional model, newly adapted cloud based IT model is more cost effective but they are having the problems of insecure database and disclosing the privacy of tags and readers. So, there is a RFID authentication protocol is developed and VPN agency is suggested to build secure backend channels. It will secure the database using hashing technique and preserves the privacy of tags and readers by providing backend communication over secure channels. Proposed scheme has the advantages like deployment cost saving, pervasiveness of authentication, database security and mobile reader holders privacy. Keywords— Cloud computing, RFID, AL, CA, Authentication.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

Traceability improvements of a new RFID protocol based on EPC C1 G2

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

متن کامل

Design of RFID Security Authentication Protocol for E-Commerce Service

As for security of RFID network, this paper has proposed a safe, effective and scalable RFID Authentication Protocol (CRFID) with cloud database as server. Firstly, the tree-structure management tag is used to achieve privacy protection, and the time complexity of RFID system in search of cloud database is reduced from O (N) to O (logN); then, the size of each subkey in keys route of the RFID t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014