Anonymous Authentication for Trustworthy Pervasive Social Networking

被引:18
|
作者
Yan, Zheng [1 ,2 ]
Feng, Wei [1 ]
Wang, Pu [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Aalto Univ, Dept Comnet, Espoo 02150, Finland
来源
关键词
Anonymous authentication; pervasive social networking (PSN); privacy preservation; trust;
D O I
10.1109/TCSS.2016.2519463
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with the support of heterogeneous networks. In order to preserve privacy and achieve trustworthy PSN, anonymous authentication on node trust is expected in PSN. However, the literature still lacks serious studies on this issue. In this paper, we propose an anonymous authentication scheme for authenticating both pseudonyms and trust levels to support trustworthy PSN with privacy preservation. The scheme achieves secure anonymous authentication with anonymity and conditional traceability on the basis of a trusted authority (TA). By applying a back-up solution, it can guarantee communications among nodes for an extended time period even when the TA is not available. In addition, the use of batch-signature verification further reduces the cost of authenticity verification of a large number of messages. Performance analysis and evaluation further prove that the proposed scheme is effective with regard to privacy preservation, computation complexity, communication cost, flexibility, reliability, and scalability.
引用
收藏
页码:88 / 98
页数:11
相关论文
共 50 条
  • [31] Unwanted Content Control via Trust Management in Pervasive Social Networking
    Yan, Zheng
    Kantola, Raimo
    Shi, Gaowa
    Zhang, Peng
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 202 - 209
  • [32] International Database Populated by Anonymous Social Networking to Study Transplant Tourism
    Jindal, Rahul M.
    TRANSPLANTATION, 2018, 102 (02) : e82 - e83
  • [33] User Authentication in Social Networking Sites using Face Recognition
    Kauri, Prabujeet
    Singh, Aruni
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 773 - 778
  • [34] A comparison of classifiers and features for authorship authentication of social networking messages
    Li, Jenny S.
    Chen, Li-Chiou
    Monaco, John V.
    Singh, Pranjal
    Tappert, Charles C.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (14):
  • [35] Trustworthy pervasive computing: The hard security problems
    Ranganathan, K
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 117 - 121
  • [36] Trust Domain Based Trustworthy Networking
    Kwak, Byeong Ok
    Chung, Tae Soo
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 1247 - 1249
  • [37] Emerging Pervasive and Ubiquitous Networking
    Benslimane, Abderrahim
    Kunz, Thomas
    Wu, Kui
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2018, 29 (1-2) : 1 - 3
  • [38] Pervasive computing and spontaneous networking
    Min, L
    Hui, W
    Ping, L
    PROCEEDINGS OF THE 4TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-4, 2002, : 2411 - 2415
  • [39] Social behavior study under pervasive social networking based on decentralized deep reinforcement learning
    Zhang, Yue
    Song, Bin
    Zhang, Peng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 86 : 72 - 81
  • [40] Pervasive authentication domains for automatic pervasive device authorization
    Sailer, R
    Giles, JR
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 144 - 148