Content-Centric Group User Authentication for Secure Social Networks

被引:7
|
作者
Shen, Jian [1 ]
Wang, Anxi [1 ]
Wang, Chen [1 ]
Li, Jiguo [2 ]
Zhang, Yan [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing Shi 210044, Pukou Qu, Peoples R China
[2] Hohai Univ, Coll Comp & Informat Engn, Nanjing Shi 210029, Jiangsu Sheng, Peoples R China
[3] Univ Oslo, Dept Informat, Oslo, Norway
关键词
Authentication; Social network services; Cryptography; Feature extraction; Computational efficiency; Data privacy; Security and privacy; user authentication; content-centric; social networks; ENCRYPTION; SCHEME;
D O I
10.1109/TETC.2017.2779163
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Content-centric computing systems, which can obtain users' attributes by analyzing information from content, have been widely used in many fields. In social networks, the computing resources of users are restricted. Group authentication schemes are required to ensure the validity of the user and the accuracy of the shared data. In this paper, we propose a content-centric group user authentication scheme to guarantee the security and accuracy of shared data. The proposed group user authentication scheme makes use of the user's content to generate the user's feature vector. Furthermore, the group authentication scheme based on the identity of each user can guarantee the network security before data sharing. In addition, regular operations in the network are not affected or damaged by incidents that occur during the authentication process. The security and performance analyses show that our scheme is secure against various attacks and has lower computational cost than the existing schemes.
引用
收藏
页码:833 / 844
页数:12
相关论文
共 50 条
  • [1] NextGen Authentication: A Secure Blockchain-Based Protocol for Content-Centric Networks With Soulbound Tokens
    Shashidhara, R.
    Chirakarotu Nair, Renju
    Kumar Panakalapati, Pavan
    IEEE ACCESS, 2024, 12 : 111293 - 111310
  • [2] A CA-based Scheme of User Authentication over Content-Centric Networking
    Lei, Kai
    Wang, Zhongjie
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1053 - 1058
  • [3] Content Discovery in Opportunistic Content-Centric Networks
    Anastasiades, Carlos
    Uruqi, Arian
    Braun, Torsten
    PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 1044 - 1052
  • [4] Content-Centric Networking for Mobile Networks
    Wang, Xiaonan
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (01) : 89 - 110
  • [5] A Content-Centric Platform for Home Networks
    Wang, Pai-Hui
    Wang, Tse-Han
    Lin, Shih-Ting
    Chen, Pei-Wen
    Tseng, Chien-Chao
    Huang, Jiun-Long
    2019 20TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2019,
  • [6] Content-Centric Networking for Mobile Networks
    Xiaonan Wang
    Wireless Personal Communications, 2019, 109 : 89 - 110
  • [7] Capacity of Content-Centric Hybrid Wireless Networks
    Liu, Jian
    Zhang, Guanglin
    Li, Demin
    Ren, Jiajie
    MACHINE LEARNING AND INTELLIGENT COMMUNICATIONS, 2017, 183 : 65 - 75
  • [8] Video Quality Measurement in Content-Centric Wireless Networks
    Park, Chanhong
    Lee, Minsub
    Nasir, Nazib Abdun
    Jeong, Seong-Ho
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 532 - 534
  • [9] Content-centric framework for Internet of Things
    Chen, Xilan
    Wang, Xiaonan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (09) : 12371 - 12385
  • [10] Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
    Iwamura, Keiichi
    Kamal, Ahmad Akmal Aminuddin Mohd
    IEEE ACCESS, 2025, 13 : 9015 - 9031