Title :
Authentication of Data on Devices
Author_Institution :
IBM T J Watson Res. Center, Hawthorne, NY, USA
Abstract :
Use of smart-phones and devices has proliferated almost all aspects of our lives. With that, each of us have become the producers and consumers of different types of data, of different levels of sensitivity, and of different levels of trustworthiness. One important aspect of managing such data on our devices and associated cloud (e.g., iCloud of Apple) is how to manage the authenticity such data. In this paper, we present a data model and a scheme towards assuring authenticity of the data. Our scheme is very efficient -- it computes only one signature.
Keywords :
message authentication; smart phones; data authentication; data authenticity management; data model; devices; sensitivity level; smart-phones; trustworthiness level; Authentication; Calendars; Context; Cryptography; Data models; Digital signatures; Hardware;
Conference_Titel :
Data Engineering Workshops (ICDEW), 2012 IEEE 28th International Conference on
Conference_Location :
Arlington, VA
Print_ISBN :
978-1-4673-1640-8
DOI :
10.1109/ICDEW.2012.79