A digital memories based user authentication scheme with privacy preservation

被引:1
|
作者
Liu, JunLiang [1 ]
Lyu, Qiuyun [1 ,2 ]
Wang, Qiuhua [1 ]
Yu, Xiangxiang [1 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace Secur, Hangzhou, Zhejiang, Peoples R China
[2] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou, Zhejiang, Peoples R China
来源
PLOS ONE | 2017年 / 12卷 / 11期
关键词
D O I
10.1371/journal.pone.0186925
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    [J]. PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 1037 - 1042
  • [2] Digital Memories Based Mobile User Authentication for IoT
    Shone, Nathan
    Dobbins, Chelsea
    Hurst, William
    Shi, Qi
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1797 - 1803
  • [3] User Authentication Scheme with Privacy-Preservation for Multi-Server Environment
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (02) : 157 - 159
  • [4] A Lightweight Authentication and Privacy Preservation Scheme for MQTT
    Tian, Sijia
    Vassilakis, Vassilios G.
    [J]. 38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1289 - 1292
  • [5] A user authentication scheme with identity and location privacy
    Hirose, S
    Yoshida, S
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 235 - 246
  • [6] Efficient Mobile User Authentication Service with Privacy Preservation and User Untraceability
    Braeken, An
    Touhafi, Abdellah
    [J]. PROCEEDINGS OF 2020 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS (CLOUDTECH'20), 2020, : 39 - 46
  • [7] User-empowered secure privacy-preserving authentication scheme for Digital Twin
    Patel, Chintan
    Pasikhani, Aryan
    Gope, Prosanta
    Clark, John
    [J]. COMPUTERS & SECURITY, 2024, 140
  • [8] Cloud auditing and authentication scheme for establishing privacy preservation
    Bingu, Rajesh
    Jothilakshmi, S.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (15) : 43849 - 43870
  • [9] On the Efficiency of a Lightweight Authentication and Privacy Preservation Scheme for MQTT
    Tian, Sijia
    Vassilakis, Vassilios G.
    [J]. ELECTRONICS, 2023, 12 (14)
  • [10] Cloud auditing and authentication scheme for establishing privacy preservation
    Rajesh Bingu
    S. Jothilakshmi
    [J]. Multimedia Tools and Applications, 2024, 83 : 43849 - 43870