Dynamic Linkability with User Authentication Privacy Preserving for Roaming Services: A Review
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 11)Publication Date: 2014-11-30
Authors : Mrunalini S. Kalamkar; Pravin Kulurkar;
Page : 176-178
Keywords : Internet of Things (IoT); conditional privacy-preserving authentication with access linkability (CPAL);
Abstract
The roaming service enables mobile subscribers to access the internet service anytime and anywhere, which can fulfill the requirement of ubiquitous access for the emerging paradigm of networking, e.g., the Internet of Things (IoT). The existing system propose a conditional privacy-preserving authentication with access linkability (CPAL) for roaming service, to provide universal secure roaming service and multilevel privacy preservation Provides an anonymous user linking function by utilizing a novel group signature technique, which can not only efficiently hide users identities but also enables the authorized entities to link all the access information of the same user without knowing the user’s real identity. Specifically, by using the master linking key possessed by the trust linking server, the authorized foreign network operators or service providers can link the access information from the user to improve its service, while preserving user anonymity, e.g., using individual access information to analyze user preferences without revealing user’s identity. Furthermore, the subscribers can also use this functionality to anonymously query their usage of service. In addition, we propose to strong smart gateway for user authentication very efficiently. Through extensive analysis, we resists various security threats and provides more flexible privacy preservation compared to the existing schemes. Meanwhile, performance evaluations demonstrate its efficiency in terms of communication and computation overhead.
Other Latest Articles
- HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
- Remote Data Back-up and Privacy Preserving Data Distribution in the Cloud: A Review
- Enhanced Approach for Keyword Based Search on Uncertain Graph Data: A Review
- Study of Data Transmission Using Sockets
- Protected Data Transfer in Wireless Sensor Network Using Promiscuous Mode?
Last modified: 2014-11-30 16:20:09