Anonymous Authentication for Trustworthy Pervasive Social Networking

被引:18
|
作者
Yan, Zheng [1 ,2 ]
Feng, Wei [1 ]
Wang, Pu [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Aalto Univ, Dept Comnet, Espoo 02150, Finland
来源
关键词
Anonymous authentication; pervasive social networking (PSN); privacy preservation; trust;
D O I
10.1109/TCSS.2016.2519463
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with the support of heterogeneous networks. In order to preserve privacy and achieve trustworthy PSN, anonymous authentication on node trust is expected in PSN. However, the literature still lacks serious studies on this issue. In this paper, we propose an anonymous authentication scheme for authenticating both pseudonyms and trust levels to support trustworthy PSN with privacy preservation. The scheme achieves secure anonymous authentication with anonymity and conditional traceability on the basis of a trusted authority (TA). By applying a back-up solution, it can guarantee communications among nodes for an extended time period even when the TA is not available. In addition, the use of batch-signature verification further reduces the cost of authenticity verification of a large number of messages. Performance analysis and evaluation further prove that the proposed scheme is effective with regard to privacy preservation, computation complexity, communication cost, flexibility, reliability, and scalability.
引用
收藏
页码:88 / 98
页数:11
相关论文
共 50 条
  • [21] Anonymous authentication
    Das Chowdhury, Partha
    Christianson, Bruce
    Malcolm, James
    SECURITY PROTOCOLS, 2006, 3957 : 299 - 311
  • [22] PRACTICAL ANONYMOUS AUTHENTICATION Designing Anonymous Authentication for Everyday Use
    Hajny, Jan
    Malina, Lukas
    Zeman, Vaclav
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 405 - 408
  • [23] Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication
    Zhang, Zhenfeng
    Yang, Kang
    Hu, Xuexian
    Wang, Yuchen
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1179 - 1191
  • [24] Anonymous Authentication and Key Agreement Protocol Based on Distributed Intelligent Vehicle Networking System
    Zhang X.
    Tang H.
    Zhang N.
    Wang W.
    Xue J.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (04): : 1333 - 1342
  • [25] Measuring the Security and reliability of Authentication of Social Networking Sites
    Sagar, Kumud
    Waghmare, Vijaya
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 668 - 674
  • [26] Biometric Authentication: A Trustworthy Technology for Improved Authentication
    Stanley, P.
    Jeberson, Wilson
    Klinsega, V. V.
    INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 171 - 175
  • [27] Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication
    Yang, Yanjiang
    Lu, Haibing
    Liu, Joseph K.
    Weng, Jian
    Zhang, Youcheng
    Zhou, Jianying
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 141 - 151
  • [28] Authentication for pervasive computing
    Creese, S
    Goldsmith, M
    Roscoe, B
    Zakiuddin, I
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 116 - 129
  • [29] Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking
    Yan, Zheng
    Peng, Li
    Feng, Wei
    Yang, Laurence T.
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (01)
  • [30] Anonymous Authentication for Smartcards
    Hajny, Jan
    RADIOENGINEERING, 2010, 19 (02) : 363 - 368