DocumentCode
573540
Title
Authentication of Data on Devices
Author
Kundu, Ashish
Author_Institution
IBM T J Watson Res. Center, Hawthorne, NY, USA
fYear
2012
fDate
1-5 April 2012
Firstpage
236
Lastpage
242
Abstract
Use of smart-phones and devices has proliferated almost all aspects of our lives. With that, each of us have become the producers and consumers of different types of data, of different levels of sensitivity, and of different levels of trustworthiness. One important aspect of managing such data on our devices and associated cloud (e.g., iCloud of Apple) is how to manage the authenticity such data. In this paper, we present a data model and a scheme towards assuring authenticity of the data. Our scheme is very efficient -- it computes only one signature.
Keywords
message authentication; smart phones; data authentication; data authenticity management; data model; devices; sensitivity level; smart-phones; trustworthiness level; Authentication; Calendars; Context; Cryptography; Data models; Digital signatures; Hardware;
fLanguage
English
Publisher
ieee
Conference_Titel
Data Engineering Workshops (ICDEW), 2012 IEEE 28th International Conference on
Conference_Location
Arlington, VA
Print_ISBN
978-1-4673-1640-8
Type
conf
DOI
10.1109/ICDEW.2012.79
Filename
6313686
Link To Document