Anonymous Authentication for Trustworthy Pervasive Social Networking

被引:18
|
作者
Yan, Zheng [1 ,2 ]
Feng, Wei [1 ]
Wang, Pu [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Aalto Univ, Dept Comnet, Espoo 02150, Finland
来源
关键词
Anonymous authentication; pervasive social networking (PSN); privacy preservation; trust;
D O I
10.1109/TCSS.2016.2519463
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with the support of heterogeneous networks. In order to preserve privacy and achieve trustworthy PSN, anonymous authentication on node trust is expected in PSN. However, the literature still lacks serious studies on this issue. In this paper, we propose an anonymous authentication scheme for authenticating both pseudonyms and trust levels to support trustworthy PSN with privacy preservation. The scheme achieves secure anonymous authentication with anonymity and conditional traceability on the basis of a trusted authority (TA). By applying a back-up solution, it can guarantee communications among nodes for an extended time period even when the TA is not available. In addition, the use of batch-signature verification further reduces the cost of authenticity verification of a large number of messages. Performance analysis and evaluation further prove that the proposed scheme is effective with regard to privacy preservation, computation complexity, communication cost, flexibility, reliability, and scalability.
引用
收藏
页码:88 / 98
页数:11
相关论文
共 50 条
  • [41] Towards a Theory of Anonymous Networking
    Ghaderi, J.
    Srikant, R.
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [42] GAP - Practical anonymous networking
    Bennett, K
    Grothoff, C
    PRIVACY ENHANCING TECHNOLOGIES, 2003, 2760 : 141 - 160
  • [43] Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels
    Yan, Zheng
    Wang, Mingjun
    IEEE SYSTEMS JOURNAL, 2017, 11 (01): : 207 - 218
  • [44] Pervasive social networking forensics: Intelligence and evidence from mobile device extracts
    Quick, Darren
    Choo, Kim-Kwang Raymond
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 86 : 24 - 33
  • [45] Anonymous networking amidst eavesdroppers
    Venkitasubramaniam, Parvathinathan
    He, Ting
    Tong, Lang
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2770 - 2784
  • [46] Context-Aware User Preferences in Systems for Pervasive Computing and Social Networking
    Papadopoulou, Elizabeth
    Gallacher, Sarah
    Taylor, Nick K.
    Williams, M. Howard
    Blackmun, Fraser
    CONTEXT-AWARE SYSTEMS AND APPLICATIONS, (ICCASA 2012), 2013, 109 : 10 - 17
  • [47] Secure Pervasive Social Networking based on Multi-Dimensional Trust Levels
    Yan, Zheng
    Wang, Mingjun
    Niemi, Valtteri
    Kantola, Raimo
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 100 - 108
  • [48] Fair authentication in pervasive computing
    Li, Jun
    Christianson, Bruce
    Loomes, Martin
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143
  • [49] International Database Populated by Anonymous Social Networking to Study Transplant Tourism Reply
    Nashan, Bjoern
    Hugo, Christian
    Strassburg, Christian
    Arbogast, Helmut
    Rahmel, Axel
    Lilie, Hans
    TRANSPLANTATION, 2018, 102 (02) : e83 - e84
  • [50] Turkish adolescents' anonymous use of social networking sites (SNSs): A phenomenological study
    Cimsir, Elif
    Akdogan, Ramazan
    Akbayrak, Alper
    PSYCHOLOGY IN THE SCHOOLS, 2024, 61 (07) : 2912 - 2929