Content-Centric Group User Authentication for Secure Social Networks

被引:7
|
作者
Shen, Jian [1 ]
Wang, Anxi [1 ]
Wang, Chen [1 ]
Li, Jiguo [2 ]
Zhang, Yan [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing Shi 210044, Pukou Qu, Peoples R China
[2] Hohai Univ, Coll Comp & Informat Engn, Nanjing Shi 210029, Jiangsu Sheng, Peoples R China
[3] Univ Oslo, Dept Informat, Oslo, Norway
关键词
Authentication; Social network services; Cryptography; Feature extraction; Computational efficiency; Data privacy; Security and privacy; user authentication; content-centric; social networks; ENCRYPTION; SCHEME;
D O I
10.1109/TETC.2017.2779163
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Content-centric computing systems, which can obtain users' attributes by analyzing information from content, have been widely used in many fields. In social networks, the computing resources of users are restricted. Group authentication schemes are required to ensure the validity of the user and the accuracy of the shared data. In this paper, we propose a content-centric group user authentication scheme to guarantee the security and accuracy of shared data. The proposed group user authentication scheme makes use of the user's content to generate the user's feature vector. Furthermore, the group authentication scheme based on the identity of each user can guarantee the network security before data sharing. In addition, regular operations in the network are not affected or damaged by incidents that occur during the authentication process. The security and performance analyses show that our scheme is secure against various attacks and has lower computational cost than the existing schemes.
引用
收藏
页码:833 / 844
页数:12
相关论文
共 50 条
  • [41] Dynamic Partitioning and Popularity based Caching for Optimized Performance in content-centric fog networks: DPPCOP
    Kumar, Sumit
    Tiwari, Rajeev
    PERVASIVE AND MOBILE COMPUTING, 2023, 88
  • [42] A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks
    Zhang, Junsong
    Zhang, Qikun
    Li, Zhigang
    Lu, Xianling
    Gan, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [43] A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks
    Marimuthu Karuppiah
    R. Saravanan
    Wireless Personal Communications, 2015, 84 : 2055 - 2078
  • [44] A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks
    Karuppiah, Marimuthu
    Saravanan, R.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 2055 - 2078
  • [45] A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
    Karuppiah, Marimuthu
    Kumari, Saru
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Basu, Sayantani
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4192 - 4209
  • [46] ESAP: Efficient and secure authentication protocol for roaming user in mobile communication networks
    BALU L PARNE
    SHUBHAM GUPTA
    NARENDRA S CHAUDHARI
    Sādhanā, 2018, 43
  • [47] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687
  • [48] A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
    Mo, Jiaqing
    Chen, Hang
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [49] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [50] Unconditionally Secure Group Authentication
    Van Dijk M.
    Gehrmann C.
    Smeets B.
    Designs, Codes and Cryptography, 1998, 14 (3) : 281 - 296