Skip to main content
Log in

A novel authentication and authorization scheme in P2P networking using location-based privacy

  • Special Issue
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

In recent years, peer-to-peer (P2P) network has reached popularity in file sharing as it is a distributed and decentralized network architecture. As there is no centralized authority, there arise various attacks, which lead to insecurity in the network. Thus, the security issues of the P2P networks are to be considered with more care. This paper proposes an authentication and authorization approach, named fuzzy enabled advanced encryption standard (AES)-based multi-level authentication and authorization to offer security against various kinds of attacks that occur in the P2P networks. Here, the authentication is carried out with the security factors, namely location profile, one-time password, spatial information, session password, a hashing function, and so on. Initially, the user and the server are registered in the authentication process, and then, hashing functions and AES are used to perform multi-level authorization and authentication processes. Thus, the proposed scheme improves the security of the P2P network. Using the proposed system, the hit ratio obtained is 0.9, and the success rate is 0.7666.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Abbreviations

P2P:

Peer-to-peer

AES:

Advanced encryption standard

TTP:

Trusted third party

LBS:

Location-based services

AA:

Attribute authority

ACs:

Attribute certificates

ATRA:

Adaptive trusted request and authorization

OSNs:

Online social networks

OOB:

Out-of-band

DES:

Data encryption standard

NIST:

National Institute of Standards and Technology

3AKEP:

Triple-authenticated key exchange protocol for peer-to-peer networks

Privacy DLP:

Privacy data leakage prevention

References

  1. García-Dorado JL, Finamore A, Mellia M, Meo M, Munafò M (2012) Characterization of ISP traffic: trends, user habits, and access technology impact. IEEE Trans Netw Serv Manag 9(2):142–155

    Article  Google Scholar 

  2. Passarella A (2012) A survey on content-centric technologies for the current Internet: CDN and P2P solutions. Comput Commun 35(1):1–32

    Article  Google Scholar 

  3. Bittorrent (2001) [Online]. https://www.bittorrent.com

  4. Internap (1996) [Online]. https://www.internap.com

  5. Qureshi A, Megías D, Rifà-Pous H (2015) Framework for preserving security and privacy in peer-to-peer content distribution systems. Expert Syst Appl 42(3):1391–1408

    Article  Google Scholar 

  6. Pecori R, Veltri L (2016) 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Comput Commun 85:28–40

    Article  Google Scholar 

  7. Chae CJ, Shin YJ, Choi K, Kim KB, Choi KN (2016) A privacy data leakage prevention method in P2P networks. Peer-to-Peer Netw Appl 9(3):508–519

    Article  Google Scholar 

  8. Forné J et al (2010) Pervasive authentication and authorization infrastructures for mobile users. Comput Secur 29(4):501–514

    Article  Google Scholar 

  9. Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services—MobiSys’03, pp 31–42

  10. Almuhimedi H et al. (2015) Your location has been shared 5398 times! a field study on mobile app privacy nudging. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems—CHI’15, pp 787–796

  11. Gutwirth S (2002) Privacy and the information age. Rowman & Littlefield Publishers, Lanham

    Google Scholar 

  12. Hengartner U (2007) Hiding location information from location-based services. In: Proceedings of the international conference on mobile data management, pp 268–272

  13. Mukhedkar M, Powar P, Gaikwad P (2015) Secure non real time image encryption algorithm development using cryptography & steganography. In: Proceedings of annual IEEE India conference (INDICON), pp 1–6

  14. Lin M, Hsu WJ (2014) Mining GPS data for mobility patterns: a survey. Pervasive Mob Comput 12:1–16

    Article  Google Scholar 

  15. Ying B, Makrakis D (2015) Protecting location privacy in vehicular networks against location-based attacks. Int J Parallel Emerg Distrib Syst 30(2):101–117

    Article  Google Scholar 

  16. You TH, Peng WC, Lee WC (2007) Protecting moving trajectories with dummies. In: Proceedings of the IEEE international conference on mobile data management, pp 278–282

  17. Hoh B, Gruteser M (2006) Protecting location privacy through path confusion. In: Proceedings of the first international conference on security and privacy for emerging areas in communications networks, pp 194–205

  18. Ghaffari M, Ghadiri N, Manshaei MH, Lahijani MS (2017) P4QS: a peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Trans Veh Technol 66(10):9458–9469

    Article  Google Scholar 

  19. Rahman SMM, Masud MM, Hossain MA, Alelaiwi A, Hassan MM, Alamri A (2016) Privacy preserving secure data exchange in mobile P2P cloud healthcare environment. Peer-to-Peer Netw Appl 9(5):894–909

    Article  Google Scholar 

  20. Yang HK, Cha HJ, Kim YH (2016) mVoIP for P2P service based authentication system using AA authentication server. Peer-to-Peer Netw Appl 9(3):529–538

    Article  Google Scholar 

  21. Chae C, Cho H (2018) Enhanced secure device authentication algorithm in P2P-based smart farm system. Peer-to-Peer Netw Appl 11(3):1230–1239

    Article  Google Scholar 

  22. Touceda DS, Cámara JMS, Zeadally S, Soriano M (2015) Attribute-based authorization for structured peer-to-peer (P2P) networks. Comput Stand Interfaces 42:71–83

    Article  Google Scholar 

  23. Li Z-Y, Liu L, Chen R-L, Bi J-L (2016) An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games. Peer-to-Peer Netw Appl 9(6):1005–1019

    Article  Google Scholar 

  24. Yeh LY, Huang YL, Joseph AD, Shieh SW, Tsaur WJ (2012) A batch-authenticated and key agreement framework for P2P-based online social networks. IEEE Trans Veh Technol 61(4):1907–1924

    Article  Google Scholar 

  25. Cheng C, Jiang T, Zhang Q (2013) TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding. IEEE J Sel Areas Commun 31(9):291–298

    Article  Google Scholar 

  26. Buchegger S, Schiöberg D, Vu L, Datta A (2009) PeerSoN : P2P social networking—early experiences and insights. In: Proceedings of the second ACM EuroSys workshop on social network systems, pp. 46–52

  27. Sharma A, Johari PK (2017) Eliminating collaborative black-hole attack by using fuzzy logic in mobile ad-hoc network. Int J Comput Sci Eng 5(5):34–41

    Google Scholar 

  28. Chander S, Vijaya P, Dhyani P (2016) MKF-firefly: hybridization of firefly and multiple kernel-based fuzzy c-means algorithm. Int J Adv Res Comput Commun Eng 5(7):213–216

    Article  Google Scholar 

  29. Veeraiah N, Krishna BT (2018) Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy Naïve Bayes rule. Multim Res 1(1):27–32

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. N. Jagdale.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jagdale, B.N., Bakal, J.W. A novel authentication and authorization scheme in P2P networking using location-based privacy. Evol. Intel. 15, 1251–1264 (2022). https://doi.org/10.1007/s12065-020-00375-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-020-00375-y

Keywords

Navigation