Skip to main content
Erschienen in: Cluster Computing 4/2022

01.09.2021

Efficient privacy-preserving anonymous authentication scheme for human predictive online education system

verfasst von: Subramani Jegadeesan, Mohammad S. Obaidat, Pandi Vijayakumar, Maria Azees, Marimuthu Karuppiah

Erschienen in: Cluster Computing | Ausgabe 4/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, online education systems (OES) are improved tremendously with the development of information communication technology. Also, OES provides the opportunity for the learners to predict and access the learning resources using Internet-of-Things (IoT) devices and it provides learning flexibility through the various artificial intelligence and soft computing approaches. The physical verification of the traditional education system is replaced with a secure authentication process for a human-centered predictive intelligence system. Many authentication schemes are available to provide authentication in human predictive OES, but they are suffering from authentication delay, computation complexity, communication cost, and user privacy. Hence, it is very difficult to provide data security using resource-limited IoT devices. In this work, a secure and efficient anonymous authentication scheme is introduced to avoid the mischievous learners and subject experts entering into OES. Also, the proposed scheme provides the essential security requirement of user privacy to OES users until they behave properly. If any chance for dispute, the system discloses the privacy of misbehaving users. The security and performance analysis section ensures that the proposed system provides a secure infrastructure to support sustainable education using resource-limited IoT devices by consuming very little computation and communication delay compared with other existing schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liagkou, V., Stylios, C., Petunin, A.: Handling privacy and concurrency in an online educational evaluation system. Balt. J. Mod. Comput. 7(1), 86–98 (2019) Liagkou, V., Stylios, C., Petunin, A.: Handling privacy and concurrency in an online educational evaluation system. Balt. J. Mod. Comput. 7(1), 86–98 (2019)
2.
Zurück zum Zitat Zhao, Y., Li, S., Jiang, L.: Secure and efficient user authentication scheme based on password and smart card for multiserver environment. Secur. Commun. Netw. 2018(1), 1–13 (2018)CrossRef Zhao, Y., Li, S., Jiang, L.: Secure and efficient user authentication scheme based on password and smart card for multiserver environment. Secur. Commun. Netw. 2018(1), 1–13 (2018)CrossRef
3.
Zurück zum Zitat Konan, M., Wang, W.: A secure mutual batch authentication scheme for patient data privacy preserving in WBAN. Sensors 19(7), 1608 (2019)CrossRef Konan, M., Wang, W.: A secure mutual batch authentication scheme for patient data privacy preserving in WBAN. Sensors 19(7), 1608 (2019)CrossRef
4.
Zurück zum Zitat Agarkar, A., Agrawal, H.: LRSPPP: lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid. Heliyon 5(3), e01321 (2019)CrossRef Agarkar, A., Agrawal, H.: LRSPPP: lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid. Heliyon 5(3), e01321 (2019)CrossRef
5.
Zurück zum Zitat Adetoba, B.T., Awodele, O., Kuyoro, S.O.: E-learning security issues and challenges: a review. J. Sci. Res. Stud. 3(5), 96–100 (2016) Adetoba, B.T., Awodele, O., Kuyoro, S.O.: E-learning security issues and challenges: a review. J. Sci. Res. Stud. 3(5), 96–100 (2016)
6.
Zurück zum Zitat Labrecque, L., Markos, E., Darmody, A.: Addressing online behavioral advertising and privacy implications: a comparison of passive versus active learning approaches. J. Mark. Educ. 2(33), 273–284 (2019) Labrecque, L., Markos, E., Darmody, A.: Addressing online behavioral advertising and privacy implications: a comparison of passive versus active learning approaches. J. Mark. Educ. 2(33), 273–284 (2019)
7.
Zurück zum Zitat Attwell, G.: E-portfolios—the DNA of the personal learning environment? J. e-Learn. Knowl. Soc. 3(2), 39–61 (2007) Attwell, G.: E-portfolios—the DNA of the personal learning environment? J. e-Learn. Knowl. Soc. 3(2), 39–61 (2007)
8.
Zurück zum Zitat Barik, N., Karforma, S.: Risks and remedies in e-learning system. Int. J. Netw. Secur. Appl. 4(1), 51–59 (2012) Barik, N., Karforma, S.: Risks and remedies in e-learning system. Int. J. Netw. Secur. Appl. 4(1), 51–59 (2012)
9.
Zurück zum Zitat Pastore, R., Chellman, A.: Motivations for residential students to participate in online courses. Q. Rev. Distance Educ. 10(3), 263–277 (2009) Pastore, R., Chellman, A.: Motivations for residential students to participate in online courses. Q. Rev. Distance Educ. 10(3), 263–277 (2009)
10.
Zurück zum Zitat Saleh, M.M., Wahid, F.A.: A review of security threats by the unauthorized in the e-learning. Int. J. Comput. Technol. 14(11), 6240–6243 (2015)CrossRef Saleh, M.M., Wahid, F.A.: A review of security threats by the unauthorized in the e-learning. Int. J. Comput. Technol. 14(11), 6240–6243 (2015)CrossRef
11.
Zurück zum Zitat Tarus, K., Gichoya, D., Muumbo, A.M.: Challenges of implementing e-learning in Kenya: a case of Kenyan public universities. Int. Rev. Res. Open Distrib. Learn. 16(1), 120–141 (2015) Tarus, K., Gichoya, D., Muumbo, A.M.: Challenges of implementing e-learning in Kenya: a case of Kenyan public universities. Int. Rev. Res. Open Distrib. Learn. 16(1), 120–141 (2015)
12.
Zurück zum Zitat Amin, R., Islam, S., Biswas, G., Giri, D., Khan, M., Kumar, N.: A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur. Commun. Netw. 9(17), 4650–4666 (2016)CrossRef Amin, R., Islam, S., Biswas, G., Giri, D., Khan, M., Kumar, N.: A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur. Commun. Netw. 9(17), 4650–4666 (2016)CrossRef
13.
Zurück zum Zitat Wang, M., Liu, D., Zhu, L., Xu, Y., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98(7), 685–708 (2014)MathSciNetCrossRef Wang, M., Liu, D., Zhu, L., Xu, Y., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98(7), 685–708 (2014)MathSciNetCrossRef
14.
Zurück zum Zitat Memon, I., Hussain, I., Akhtar, R., Chen, G.: Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wirel. Pers. Commun. 84(2), 1487–1508 (2014)CrossRef Memon, I., Hussain, I., Akhtar, R., Chen, G.: Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wirel. Pers. Commun. 84(2), 1487–1508 (2014)CrossRef
15.
Zurück zum Zitat Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004)MathSciNetCrossRef Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004)MathSciNetCrossRef
16.
Zurück zum Zitat Gong, Z., Long, Y., Hong, X., Chen, K.: Two certificate-less aggregate signatures from bilinear maps. In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), August 2007, vol. 3, pp. 188–193 Gong, Z., Long, Y., Hong, X., Chen, K.: Two certificate-less aggregate signatures from bilinear maps. In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), August 2007, vol. 3, pp. 188–193
17.
Zurück zum Zitat Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef
18.
Zurück zum Zitat Lu, R., Lin, X., Luan, T.-H.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)CrossRef Lu, R., Lin, X., Luan, T.-H.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)CrossRef
19.
Zurück zum Zitat Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711–1720 (2016)CrossRef Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711–1720 (2016)CrossRef
21.
Zurück zum Zitat Zeng, X., Xu, G., Zheng, X., Xiang, Y., Zhou, W.: E-AUA: an efficient anonymous user authentication protocol for mobile IoT. IEEE Access 6(2), 1506–1519 (2019) Zeng, X., Xu, G., Zheng, X., Xiang, Y., Zhou, W.: E-AUA: an efficient anonymous user authentication protocol for mobile IoT. IEEE Access 6(2), 1506–1519 (2019)
22.
Zurück zum Zitat Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Advances in Cryptology-Asiacrypt’03, LNCS, vol. 2894, pp. 452–473. Springer, 2003 Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Advances in Cryptology-Asiacrypt’03, LNCS, vol. 2894, pp. 452–473. Springer, 2003
23.
Zurück zum Zitat Chen, X., Zhang, F., Kim, K.: A new ID-based group signature scheme from bilinear pairings. In: Proceedings of WISA’03, LNCS, vol. 2908, pp. 585–592. Springer, 2003 Chen, X., Zhang, F., Kim, K.: A new ID-based group signature scheme from bilinear pairings. In: Proceedings of WISA’03, LNCS, vol. 2908, pp. 585–592. Springer, 2003
24.
Zurück zum Zitat Zhang, Z., Wong, D., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Proceedings of ACNS 2006, LNCS, vol. 3989, pp. 293–308. Springer, 2006 Zhang, Z., Wong, D., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Proceedings of ACNS 2006, LNCS, vol. 3989, pp. 293–308. Springer, 2006
25.
Zurück zum Zitat Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based sign-cryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)CrossRef Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based sign-cryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)CrossRef
26.
Zurück zum Zitat Cagalaban, G., Kim, S.: Towards a secure patient information access control in ubiquitous healthcare systems using identity-based sign-cryption. In: Proceedings of the 13th International Conference on Advanced Communication Technology, Seoul, Korea, pp. 863–867, 2011. Cagalaban, G., Kim, S.: Towards a secure patient information access control in ubiquitous healthcare systems using identity-based sign-cryption. In: Proceedings of the 13th International Conference on Advanced Communication Technology, Seoul, Korea, pp. 863–867, 2011.
27.
Zurück zum Zitat Braeken, A., Porambage, P., Stojmenovic, M., Lambrinos, L.: eDAAAS: efficient distributed anonymous authentication and access in smart homes. Int. J. Distrib. Sens. Netw. 12(12), 1–11 (2016)CrossRef Braeken, A., Porambage, P., Stojmenovic, M., Lambrinos, L.: eDAAAS: efficient distributed anonymous authentication and access in smart homes. Int. J. Distrib. Sens. Netw. 12(12), 1–11 (2016)CrossRef
28.
Zurück zum Zitat Liu, J., Zhang, Z., Chen, X., Kwak, K.S.: Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2014)CrossRef Liu, J., Zhang, Z., Chen, X., Kwak, K.S.: Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2014)CrossRef
29.
Zurück zum Zitat Mahdi, A.O., Alhabbash, M.I., Abu-Naser, S.S.: An intelligent tutoring system for teaching advanced topics in information security. Worldw. J. Multidiscip. Res. Dev. 2(12), 1–9 (2016) Mahdi, A.O., Alhabbash, M.I., Abu-Naser, S.S.: An intelligent tutoring system for teaching advanced topics in information security. Worldw. J. Multidiscip. Res. Dev. 2(12), 1–9 (2016)
30.
Zurück zum Zitat Ikedinachi, A.P., Misra, S., Assibong, P.A., Olu-Owolabi, E.F., Maskeliūnas, R., Damasevicius, R.: Artificial intelligence, smart classrooms and online education in the 21st century: implications for human development. J. Cases Inf. Technol. 21(3), 66–79 (2019)CrossRef Ikedinachi, A.P., Misra, S., Assibong, P.A., Olu-Owolabi, E.F., Maskeliūnas, R., Damasevicius, R.: Artificial intelligence, smart classrooms and online education in the 21st century: implications for human development. J. Cases Inf. Technol. 21(3), 66–79 (2019)CrossRef
31.
Zurück zum Zitat Popenici, S.A., Kerr, S.: Exploring the impact of artificial intelligence on teaching and learning in higher education. Res. Pract. Technol. Enhanc Learn. 12(1), 22 (2017)CrossRef Popenici, S.A., Kerr, S.: Exploring the impact of artificial intelligence on teaching and learning in higher education. Res. Pract. Technol. Enhanc Learn. 12(1), 22 (2017)CrossRef
32.
Zurück zum Zitat Cukurova, M., Kent, C., Luckin, R.: Artificial intelligence and multimodal data in the service of human decision-making: a case study in debate tutoring. Br. J. Educ. Technol. 50(6), 3032–3046 (2019)CrossRef Cukurova, M., Kent, C., Luckin, R.: Artificial intelligence and multimodal data in the service of human decision-making: a case study in debate tutoring. Br. J. Educ. Technol. 50(6), 3032–3046 (2019)CrossRef
34.
Zurück zum Zitat Vijayakumar, P., Chang, V., Jegatha Deborah, L., Balusamy, B., Shynu, P.G.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst. 78, 943–955 (2018)CrossRef Vijayakumar, P., Chang, V., Jegatha Deborah, L., Balusamy, B., Shynu, P.G.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst. 78, 943–955 (2018)CrossRef
35.
Zurück zum Zitat Obaidat, M.S., Traore, I., Woungang, I.: Biometric-Based Physical and Cybersecurity Systems. Springer, Cham (2019)CrossRef Obaidat, M.S., Traore, I., Woungang, I.: Biometric-Based Physical and Cybersecurity Systems. Springer, Cham (2019)CrossRef
36.
Zurück zum Zitat Obaidat, M.S., Boudriga, N.: Security of e-Systems and Computer Networks. Cambridge University Press, New York (2007)CrossRef Obaidat, M.S., Boudriga, N.: Security of e-Systems and Computer Networks. Cambridge University Press, New York (2007)CrossRef
37.
Zurück zum Zitat Vijayakumar, P., Azees, M., Chang, V., Deborah, J., Balusamy, B.: Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust. Comput. 20(3), 2439–2450 (2017)CrossRef Vijayakumar, P., Azees, M., Chang, V., Deborah, J., Balusamy, B.: Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust. Comput. 20(3), 2439–2450 (2017)CrossRef
39.
Zurück zum Zitat Azees, M., Vijayakumar, P., Karuppiah, M., Nayyar, A.: An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wirel. Netw. 27(3), 2119–2130 (2021)CrossRef Azees, M., Vijayakumar, P., Karuppiah, M., Nayyar, A.: An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wirel. Netw. 27(3), 2119–2130 (2021)CrossRef
40.
Zurück zum Zitat Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. J. Inf. Secur. Appl. 19(4–5), 282–294 (2014) Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. J. Inf. Secur. Appl. 19(4–5), 282–294 (2014)
41.
Zurück zum Zitat Karuppiah, M., Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3), 2055–2078 (2015)CrossRef Karuppiah, M., Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3), 2055–2078 (2015)CrossRef
Metadaten
Titel
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
verfasst von
Subramani Jegadeesan
Mohammad S. Obaidat
Pandi Vijayakumar
Maria Azees
Marimuthu Karuppiah
Publikationsdatum
01.09.2021
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 4/2022
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-021-03390-5

Weitere Artikel der Ausgabe 4/2022

Cluster Computing 4/2022 Zur Ausgabe

Premium Partner