Efficient privacy-preserving anonymous authentication scheme for human predictive online education system

In recent years, online education systems (OES) are improved tremendously with the development of information communication technology. Also, OES provides the opportunity for the learners to predict and access the learning resources using Internet-of-Things (IoT) devices and it provides learning flexibility through the various artificial intelligence and soft computing approaches. The physical verification of the traditional education system is replaced with a secure authentication process for a human-centered predictive intelligence system. Many authentication schemes are available to provide authentication in human predictive OES, but they are suffering from authentication delay, computation complexity, communication cost, and user privacy. Hence, it is very difficult to provide data security using resource-limited IoT devices. In this work, a secure and efficient anonymous authentication scheme is introduced to avoid the mischievous learners and subject experts entering into OES. Also, the proposed scheme provides the essential security requirement of user privacy to OES users until they behave properly. If any chance for dispute, the system discloses the privacy of misbehaving users. The security and performance analysis section ensures that the proposed system provides a secure infrastructure to support sustainable education using resource-limited IoT devices by consuming very little computation and communication delay compared with other existing schemes.

[1]  Sharon Kerr,et al.  Exploring the impact of artificial intelligence on teaching and learning in higher education , 2017, Research and Practice in Technology Enhanced Learning.

[2]  John K. Tarus,et al.  Challenges of implementing e-learning in Kenya: A case of Kenyan public universities , 2015 .

[3]  Wanlei Zhou,et al.  E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT , 2019, IEEE Internet of Things Journal.

[4]  R. Saravanan,et al.  A secure remote user mutual authentication scheme using smart cards , 2014, J. Inf. Secur. Appl..

[5]  Rosemary Luckin,et al.  Artificial intelligence and multimodal data in the service of human decision-making: A case study in debate tutoring , 2019, Br. J. Educ. Technol..

[6]  Seoksoo Kim,et al.  Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[7]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[8]  Mohammad S. Obaidat,et al.  Security of e-Systems and Computer Networks , 2007 .

[9]  R. Saravanan,et al.  A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks , 2015, Wirel. Pers. Commun..

[10]  Sai Ji,et al.  An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities , 2021, Int. J. Distributed Sens. Networks.

[11]  Chrysostomos D. Stylios,et al.  Handling Privacy and Concurrency in an Online Educational Evaluation System , 2019 .

[12]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[13]  Mohammad S. Obaidat,et al.  Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs , 2020, IEEE Transactions on Industrial Informatics.

[14]  Imran Memon,et al.  Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme , 2015, Wirel. Pers. Commun..

[15]  Liehuang Zhu,et al.  LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication , 2014, Computing.

[16]  Kefei Chen,et al.  An Adaptive Stable Link Selection Algorithm for Mobile Ad Hoc Networks , 2007 .

[17]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[18]  Lauren I. Labrecque,et al.  Addressing Online Behavioral Advertising and Privacy Implications: A Comparison of Passive Versus Active Learning Approaches , 2019, Journal of Marketing Education.

[19]  Muhammad Khurram Khan,et al.  A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments , 2016, Secur. Commun. Networks.

[20]  Sunil Karforma,et al.  Risks and remedies in e-learning system , 2012, ArXiv.

[21]  D. Boneh,et al.  Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.

[22]  Wenyong Wang,et al.  A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN , 2019, Sensors.

[23]  Mohamed Munser Saleh A Review of Security Threats by The Unauthorized in The E-Learning , 2015 .

[24]  Xiaodong Lin,et al.  A Threshold Anonymous Authentication Protocol for VANETs , 2016, IEEE Transactions on Vehicular Technology.

[25]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[26]  Xiaofeng Liao,et al.  Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.

[27]  Liehui Jiang,et al.  Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment , 2018, Secur. Commun. Networks.

[28]  Aarti Amod Agarkar,et al.  LRSPPP: lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid , 2019, Heliyon.

[29]  Samy S. Abu Naser,et al.  An intelligent tutoring system for teaching advanced topics in information security , 2016 .

[30]  Victor I. Chang,et al.  Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks , 2017, Cluster Computing.

[31]  An Braeken,et al.  eDAAAS: Efficient distributed anonymous authentication and access in smart homes , 2016, Int. J. Distributed Sens. Networks.

[32]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[33]  Rytis Maskeliunas,et al.  Artificial Intelligence, Smart Classrooms and Online Education in the 21st Century: Implications for Human Development , 2019, J. Cases Inf. Technol..

[34]  Alison A. Carr-Chellman,et al.  Motivations for Residential Students to Participate in Online Courses , 2009 .

[35]  Anand Nayyar,et al.  An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks , 2021, Wireless Networks.

[36]  Kwangjo Kim,et al.  A New ID-based Group Signature Scheme from Bilinear Pairings , 2003, IACR Cryptol. ePrint Arch..

[37]  Victor I. Chang,et al.  Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks , 2018, Future Gener. Comput. Syst..