A novel scheme of anonymous authentication on trust in Pervasive Social Networking

Abstract Pervasive Social Networking (PSN) supports various social activities at any time and in any places with the heterogeneous networks. Trust plays a crucial role in securing PSN. Authenticating trust anonymously is becoming an attractive approach to ensuring trustworthy and privacy-preserving social networking. However, the literature still lacks serious studies on this topic, especially for PSN systems. In this paper, we propose a novel scheme to authenticate PSN node trust in an anonymous and semi-distributed manner. The scheme allows one or multiple Authorized Parties (APs) to announce up-to-date aggregate lists of Integrated Node Trust (INT) for certificateless authenticating trust with anonymity, unforgeability, unlinkability and conditional traceability. In addition, multiple APs can cooperate to flexibly conduct trust authentication without significantly increasing computational overhead. Aggregate signature verification further improves scheme efficiency. Security proof, performance analysis and evaluation show that our scheme is effective with regard to security, privacy preservation, computational complexity, communication cost, efficiency, scalability and flexibility.

[1]  T. Ciszkowski,et al.  Distributed Reputation Management in Collaborative Environment of Anonymous MANETs , 2007, EUROCON 2007 - The International Conference on "Computer as a Tool".

[2]  Xiaodong Lin,et al.  Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[3]  K. Emura,et al.  Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation , 2016, IEEE Transactions on Emerging Topics in Computing.

[4]  Yu Cheng,et al.  A Distributed Key Management Framework with Cooperative Message Authentication in VANETs , 2011, IEEE Journal on Selected Areas in Communications.

[5]  Valtteri Niemi,et al.  Secure pervasive social networking based on multi-dimensional trust levels , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[6]  Xuemin Shen,et al.  EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.

[7]  Yue Shen,et al.  PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.

[8]  Xiaodong Lin,et al.  A Threshold Anonymous Authentication Protocol for VANETs , 2016, IEEE Transactions on Vehicular Technology.

[9]  Victor C. M. Leung,et al.  Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.

[10]  Libing Wu,et al.  Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks , 2016, Journal of Medical Systems.

[11]  A. Miyaji,et al.  New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .

[12]  Zheng Yan,et al.  Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels , 2017, IEEE Systems Journal.

[13]  Zheng Yan,et al.  Secure Pervasive Social Communications Based on Trust in a Distributed Way , 2016, IEEE Access.

[14]  Yue Shen,et al.  A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..

[15]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[16]  Yan Zheng,et al.  Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.

[17]  A. Damodaram,et al.  ANONYMITY AND ACCOUNTABILITY IN WEB BASED TRANSACTIONS , 2012 .

[18]  Moti Yung,et al.  Group Signatures with Almost-for-Free Revocation , 2012, CRYPTO.

[19]  Xuemin Shen,et al.  Efficient Group Signature Scheme Supporting Batch Verification for Securing Vehicular Networks , 2010, 2010 IEEE International Conference on Communications.

[20]  Bruce Christianson,et al.  Anonymous Authentication , 2004, Security Protocols Workshop.

[21]  Atsuko Miyaji,et al.  Secure VANET applications with a refined group signature , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.

[22]  Lorrie Faith Cranor,et al.  An Investigation into Facebook Friend Grouping , 2011, INTERACT.

[23]  Joseph K. Liu,et al.  Time-Bound Anonymous Authentication for Roaming Networks , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Tadanori Mizuno,et al.  Message authentication scheme for mobile ad hoc networks , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[25]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[26]  Pin-Han Ho,et al.  TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.

[27]  Ahmad-Reza Sadeghi,et al.  Anonymous Authentication with TLS and DAA , 2010, TRUST.

[28]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[29]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[30]  Zheng Yan,et al.  Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature , 2017, IEEE Access.

[31]  Josep Domingo-Ferrer,et al.  A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[32]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[33]  Rui L. Aguiar,et al.  Support of Anonymity in VANETs - Putting Pseudonymity into Practice , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[34]  Zheng Yan,et al.  A Scheme to Secure Instant Community Data Access Based on Trust and Contexts , 2014, 2014 IEEE International Conference on Computer and Information Technology.

[35]  Hui Li,et al.  Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks , 2014, IEEE Transactions on Vehicular Technology.

[36]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[37]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[38]  Yun-kyung Lee,et al.  Anonymous Authentication System Using Group Signature , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.

[39]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[40]  Jinjun Chen,et al.  Efficiently Predicting Trustworthiness of Mobile Services Based on Trust Propagation in Social Networks , 2015, Mob. Networks Appl..

[41]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.