Content-Centric Group User Authentication for Secure Social Networks

被引:7
|
作者
Shen, Jian [1 ]
Wang, Anxi [1 ]
Wang, Chen [1 ]
Li, Jiguo [2 ]
Zhang, Yan [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing Shi 210044, Pukou Qu, Peoples R China
[2] Hohai Univ, Coll Comp & Informat Engn, Nanjing Shi 210029, Jiangsu Sheng, Peoples R China
[3] Univ Oslo, Dept Informat, Oslo, Norway
关键词
Authentication; Social network services; Cryptography; Feature extraction; Computational efficiency; Data privacy; Security and privacy; user authentication; content-centric; social networks; ENCRYPTION; SCHEME;
D O I
10.1109/TETC.2017.2779163
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Content-centric computing systems, which can obtain users' attributes by analyzing information from content, have been widely used in many fields. In social networks, the computing resources of users are restricted. Group authentication schemes are required to ensure the validity of the user and the accuracy of the shared data. In this paper, we propose a content-centric group user authentication scheme to guarantee the security and accuracy of shared data. The proposed group user authentication scheme makes use of the user's content to generate the user's feature vector. Furthermore, the group authentication scheme based on the identity of each user can guarantee the network security before data sharing. In addition, regular operations in the network are not affected or damaged by incidents that occur during the authentication process. The security and performance analyses show that our scheme is secure against various attacks and has lower computational cost than the existing schemes.
引用
收藏
页码:833 / 844
页数:12
相关论文
共 50 条
  • [31] Secure Multifactor Remote Access User Authentication Framework for IoT Networks
    Alshahrani, Mohammed Mujib
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 3235 - 3254
  • [32] An Efficient and Secure User Authentication Scheme with Anonymity in Global Mobility Networks
    Madhusudhan, R.
    Suvidha, K. S.
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 19 - 24
  • [33] Efficient User Authentication and Secure Data Transmission in Wireless Sensor Networks
    Das, Manik Lal
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 240 - 245
  • [34] A provably secure group authentication protocol for various LTE networks
    Kijjabuncha, Boriphat
    Hiranvanichakorn, Pipat
    International Journal of Network Security, 2019, 21 (06): : 957 - 970
  • [35] Secure and Efficient Large Content Broadcasting in Mobile Social Networks
    Fu, Tingting
    Liu, Peng
    Ding, Yue
    Zhang, Yuan
    IEEE ACCESS, 2018, 6 : 42108 - 42118
  • [36] A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks
    Chandrakar, Preeti
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2019, 10 (01) : 96 - 116
  • [37] Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    Hu, Bin
    Wong, Duncan S.
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 124 - 129
  • [38] Responsive Content-Centric Delivery in Large Urban Communication Networks: A LinkNYC Use-Case
    Sinky, Hassan
    Khalfi, Bassem
    Hamdaoui, Bechir
    Rayes, Ammar
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (03) : 1688 - 1699
  • [39] Push applications and dynamic content generation over content-centric networking
    Virgilio, Matteo
    Marchetto, Guido
    Sisto, Riccardo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (03)
  • [40] A Secure User Authentication Protocol for Heterogeneous Mobile Environments
    Hassan, Alzubair
    Hamza, Rafik
    Li, Fagen
    Ali, Awad
    Bashir, Mohammed Bakri
    Alqhtani, Samar M.
    Tawfeeg, Tawfeeg Mohmmed
    Yousif, Adil
    IEEE ACCESS, 2022, 10 : 69757 - 69770