Skip to main content

AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking

  • Conference paper
  • First Online:
Security and Privacy in Digital Economy (SPDE 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1268))

Included in the following conference series:

  • 1688 Accesses

Abstract

Pervasive social networking (PSN) is facilitating and enriching people’s life at any time and in any place. One of the most important issues in PSN is its security and privacy, since users hope their privacy not to be disclosed in social activities. Trust relationship plays a crucial role in the PSN system, and can be utilized to support trustworthy PSN system with anonymous authentication. Thus, this paper proposes an anonymous trust authentication (AnonyTrust) scheme that can simultaneously authenticate identities and trust levels of users with privacy preservation. It also can achieve conditional traceability with a trusted server (TS), and can switch online and offline states with multiple authorized access points (APs). The security analysis and performance evaluation show the scheme is secure and efficient regarding security, anonymity, computational complexity, and communication cost. To verify the feasibility of the proposed scheme, a lightweight secret chat application called AnonyChat is developed in practice. The results show AnonyChat performs well and efficiently in Android devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yan, Z., Zeng, K., Xiao, Y., Samarati, P., et al.: Guest editorial special issue on trust, security, and privacy in crowdsourcing. IEEE Internet Things J. 5(4), 2880–2883 (2018)

    Article  Google Scholar 

  2. Ahtiainen, A., Kalliojarvi, K., Kasslin, M., Leppanen, K., Richter, A., Ruuska, P., Wijting, C.: Awareness networking in wireless environments. IEEE Veh. Technol. Mag. 4(3), 48–54 (2009)

    Article  Google Scholar 

  3. Shen, X., Yu, H., Buford, J., Akon, M. (eds.): Handbook of Peer-to-Peer Networking, vol. 34. Springer, Boston (2010). https://doi.org/10.1007/978-0-387-09751-0

    Book  MATH  Google Scholar 

  4. Yan, Z., Chen, Y., Shen, Y.: A practical reputation system for pervasive social chatting. J. Comput. Syst. Sci. 79(5), 556–572 (2013)

    Article  MathSciNet  Google Scholar 

  5. Qu, Y., Yu, S., Zhou, W., Peng, S., Wang, G., Xiao, K.: Privacy of things: emerging challenges and opportunities in wireless Internet of Things. IEEE Wirel. Commun. 25(6), 91–97 (2018)

    Article  Google Scholar 

  6. Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016)

    Article  Google Scholar 

  7. Zhang, C., Lu, R., Lin, X., Ho, P., Shen, X: An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246–250. IEEE (2008)

    Google Scholar 

  8. Wasef, A., Shen, X.: Efficient group signature scheme supporting batch verification for securing vehicular networks. In: 2010 IEEE International Conference on Communications, pp. 1–5. IEEE (2010)

    Google Scholar 

  9. Liu, J., Zhang, Z., Chen, X., Kwak, K.: Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2013)

    Article  Google Scholar 

  10. Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28628-8_3

    Chapter  Google Scholar 

  11. Lee, Y., Han, S., Lee, S., Chung, B., Lee, D.: Anonymous authentication system using group signature. In: 2009 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 1235–1239. IEEE (2009)

    Google Scholar 

  12. Ren, K., Lou, W., Kim, K., Deng, R.: A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Trans. Veh. Technol. 55(4), 1373–1384 (2006)

    Article  Google Scholar 

  13. Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711–1720 (2015)

    Article  Google Scholar 

  14. Yan, Z., Feng, W., Wang, P.: Anonymous authentication for trustworthy pervasive social networking. IEEE Trans. Comput. Soc. Syst. 2(3), 88–98 (2015)

    Article  Google Scholar 

  15. Yan, Z., Wang, P., Feng, W.: A novel scheme of anonymous authentication on trust in pervasive social networking. Inf. Sci. 445, 79–96 (2018)

    Article  MathSciNet  MATH  Google Scholar 

  16. Lindell, Y.: Anonymous authentication. J. Priv. Confidentiality 2(2) (2011). https://doi.org/10.29012/jpc.v2i2.590

  17. Lin, X., Sun, X., Wang, X., Zhang, C., Ho, P., Shen, X.: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wireless Commun. 7(12), 4987–4998 (2008)

    Article  Google Scholar 

  18. Sato, F., Takahira, H., Mizuno, T.: Message authentication scheme for mobile ad hoc networks. In: 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), vol. 1, pp. 50–56 (2005)

    Google Scholar 

  19. Lin, X., Li, X.: Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 62(7), 3339–3348 (2013)

    Article  Google Scholar 

  20. Zhang, L., Wu, Q., Solanas, A., Domingo-Ferrer, J.: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59(4), 1606–1617 (2009)

    Article  Google Scholar 

  21. Hao, Y., Cheng, Y., Zhou, C., Song, W.: A distributed key management framework with cooperative message authentication in VANETs. IEEE J. Sel. Areas Commun. 29(3), 616–629 (2011)

    Article  Google Scholar 

  22. Feng, W., Yan, Z., Xie, H.: Anonymous authentication on trust in pervasive social networking based on group signature. IEEE Access 5, 6236–6246 (2017)

    Article  Google Scholar 

  23. Huszti, A.: Anonymous multi-vendor micropayment scheme based on bilinear maps. In: International Conference on Information Society (i-Society 2014), pp. 25–30. IEEE (2014)

    Google Scholar 

  24. Yan, Z., Zhang, P., Vasilakos, A.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42, 120–134 (2014)

    Article  Google Scholar 

  25. Li, N., Yan, Z., Wang, M., Yang, L.: Securing communication data in pervasive social networking based on trust with KP-ABE. ACM Trans. Cyber Phys. Syst. 3(1), 1–23 (2018)

    Google Scholar 

  26. Yan, Z., Shi, W.: Cloudfile: a cloud data access control system based on mobile social trust. J. Netw. Comput. Appl. 86, 46–58 (2017)

    Article  Google Scholar 

  27. Yan, Z., Wang, M.: Protect pervasive social networking based on two-dimensional trust levels. IEEE Syst. J. 11(1), 207–218 (2014)

    Article  Google Scholar 

  28. Zhao, H., Sun, D., Yue, H., Zhao, M., Cheng, S.: Dynamic trust model for vehicular cyber-physical systems. IJ Netw. Secur. 20(1), 157–167 (2018)

    Google Scholar 

  29. Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  30. Cao, X., Zeng, X., Kou, W., Hu, L.: Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7), 3508–3517 (2009)

    Article  Google Scholar 

Download references

Acknowledgment

The work is supported in part by the National Natural Science Foundation of China under Grants 61672410 and 61802293, the Academy of Finland under Grants 308087 and 314203, the Key Lab of Information Network Security, Ministry of Public Security under grant No. C18614, the open grant of the Tactical Data Link Lab of the 20th Research Institute of China Electronics Technology Group Corporation, P.R. China under grant CLDL-20182119, the Shaanxi Innovation Team project under grant 2018TD-007, and the 111 project under grant B16037.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, P., He, L., Yan, Z., Feng, W. (2020). AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9129-7_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9128-0

  • Online ISBN: 978-981-15-9129-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics