Downloads: 190 | Views: 467 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Review Papers | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017 | Popularity: 7.4 / 10
Various Authentication Techniques for Trustworthy Pervasive Social Networking
Bhagyashri Mitkari, Dr. Khan Rahat Afreen
Abstract: Pervasive social networking (PSN) helps instantaneous social hobbies at any place and at any time with the support of heterogeneous networks. Sending of data over the web for various purposes has been included as an essential part of technological know-how now days. However, the information dispatched over the web as good knowledge to be retrieved can be hacked with the aid of some other party in a few methods. To furnish the comfortable transmission and receiving of data, more than a few cryptographic schemes have been proposed in the final decade. Among the existing schemes the data integrity shouldn't be ensured in a quantity of facets. Hence, data Hiding Scheme makes use of digital signature authentication, which is used to hide the security key. So as to continue privacy and reap riskless PSN, anonymous digital signature authentication on node trust is predicted in PSN. The literature still lacks critical reports on this predicament. An anonymous authentication scheme for authenticating both pseudonyms and believe levels to support safe PSN with privacy maintenance. The scheme achieves cozy anonymous authentication with anonymity and conditional traceability on the groundwork depend up on Trusted Authority (TA). By way of applying a back-up resolution, it may possibly guarantee communications among nodes for an improved time period even when the TA is not on hand. In addition, the usage of batch-signature verification further reduces the rate of authenticity verification of a gigantic number of messages. Performance analysis and evaluation further show that the proposed scheme is robust with reference to privateer's maintenance, computation complexity, conversation cost, flexibility, reliability, and scalability.
Keywords: Digital Signature Authentication, Pervasive Social Networking PSN, Privacy Preservation, Trust
Edition: Volume 6 Issue 4, April 2017
Pages: 8 - 10
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 672 - 675Increasing the Trust Factor in Cognitive Radio Networks Driven by Software Defined Radio
Shashank Dhananjaya, Yuvaraju B N
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 4, April 2024
Pages: 923 - 930Robustness Testing for AI/ML Models: Strategies for Identifying and Mitigating Vulnerabilities
Praveen Kumar, Shailendra Bade
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 832 - 839Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1349 - 1363IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing
Ponnarasan Krishnan