Abstract
In recent years, peer-to-peer (P2P) network has reached popularity in file sharing as it is a distributed and decentralized network architecture. As there is no centralized authority, there arise various attacks, which lead to insecurity in the network. Thus, the security issues of the P2P networks are to be considered with more care. This paper proposes an authentication and authorization approach, named fuzzy enabled advanced encryption standard (AES)-based multi-level authentication and authorization to offer security against various kinds of attacks that occur in the P2P networks. Here, the authentication is carried out with the security factors, namely location profile, one-time password, spatial information, session password, a hashing function, and so on. Initially, the user and the server are registered in the authentication process, and then, hashing functions and AES are used to perform multi-level authorization and authentication processes. Thus, the proposed scheme improves the security of the P2P network. Using the proposed system, the hit ratio obtained is 0.9, and the success rate is 0.7666.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Abbreviations
- P2P:
-
Peer-to-peer
- AES:
-
Advanced encryption standard
- TTP:
-
Trusted third party
- LBS:
-
Location-based services
- AA:
-
Attribute authority
- ACs:
-
Attribute certificates
- ATRA:
-
Adaptive trusted request and authorization
- OSNs:
-
Online social networks
- OOB:
-
Out-of-band
- DES:
-
Data encryption standard
- NIST:
-
National Institute of Standards and Technology
- 3AKEP:
-
Triple-authenticated key exchange protocol for peer-to-peer networks
- Privacy DLP:
-
Privacy data leakage prevention
References
García-Dorado JL, Finamore A, Mellia M, Meo M, Munafò M (2012) Characterization of ISP traffic: trends, user habits, and access technology impact. IEEE Trans Netw Serv Manag 9(2):142–155
Passarella A (2012) A survey on content-centric technologies for the current Internet: CDN and P2P solutions. Comput Commun 35(1):1–32
Bittorrent (2001) [Online]. https://www.bittorrent.com
Internap (1996) [Online]. https://www.internap.com
Qureshi A, Megías D, Rifà-Pous H (2015) Framework for preserving security and privacy in peer-to-peer content distribution systems. Expert Syst Appl 42(3):1391–1408
Pecori R, Veltri L (2016) 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Comput Commun 85:28–40
Chae CJ, Shin YJ, Choi K, Kim KB, Choi KN (2016) A privacy data leakage prevention method in P2P networks. Peer-to-Peer Netw Appl 9(3):508–519
Forné J et al (2010) Pervasive authentication and authorization infrastructures for mobile users. Comput Secur 29(4):501–514
Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services—MobiSys’03, pp 31–42
Almuhimedi H et al. (2015) Your location has been shared 5398 times! a field study on mobile app privacy nudging. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems—CHI’15, pp 787–796
Gutwirth S (2002) Privacy and the information age. Rowman & Littlefield Publishers, Lanham
Hengartner U (2007) Hiding location information from location-based services. In: Proceedings of the international conference on mobile data management, pp 268–272
Mukhedkar M, Powar P, Gaikwad P (2015) Secure non real time image encryption algorithm development using cryptography & steganography. In: Proceedings of annual IEEE India conference (INDICON), pp 1–6
Lin M, Hsu WJ (2014) Mining GPS data for mobility patterns: a survey. Pervasive Mob Comput 12:1–16
Ying B, Makrakis D (2015) Protecting location privacy in vehicular networks against location-based attacks. Int J Parallel Emerg Distrib Syst 30(2):101–117
You TH, Peng WC, Lee WC (2007) Protecting moving trajectories with dummies. In: Proceedings of the IEEE international conference on mobile data management, pp 278–282
Hoh B, Gruteser M (2006) Protecting location privacy through path confusion. In: Proceedings of the first international conference on security and privacy for emerging areas in communications networks, pp 194–205
Ghaffari M, Ghadiri N, Manshaei MH, Lahijani MS (2017) P4QS: a peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Trans Veh Technol 66(10):9458–9469
Rahman SMM, Masud MM, Hossain MA, Alelaiwi A, Hassan MM, Alamri A (2016) Privacy preserving secure data exchange in mobile P2P cloud healthcare environment. Peer-to-Peer Netw Appl 9(5):894–909
Yang HK, Cha HJ, Kim YH (2016) mVoIP for P2P service based authentication system using AA authentication server. Peer-to-Peer Netw Appl 9(3):529–538
Chae C, Cho H (2018) Enhanced secure device authentication algorithm in P2P-based smart farm system. Peer-to-Peer Netw Appl 11(3):1230–1239
Touceda DS, Cámara JMS, Zeadally S, Soriano M (2015) Attribute-based authorization for structured peer-to-peer (P2P) networks. Comput Stand Interfaces 42:71–83
Li Z-Y, Liu L, Chen R-L, Bi J-L (2016) An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games. Peer-to-Peer Netw Appl 9(6):1005–1019
Yeh LY, Huang YL, Joseph AD, Shieh SW, Tsaur WJ (2012) A batch-authenticated and key agreement framework for P2P-based online social networks. IEEE Trans Veh Technol 61(4):1907–1924
Cheng C, Jiang T, Zhang Q (2013) TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding. IEEE J Sel Areas Commun 31(9):291–298
Buchegger S, Schiöberg D, Vu L, Datta A (2009) PeerSoN : P2P social networking—early experiences and insights. In: Proceedings of the second ACM EuroSys workshop on social network systems, pp. 46–52
Sharma A, Johari PK (2017) Eliminating collaborative black-hole attack by using fuzzy logic in mobile ad-hoc network. Int J Comput Sci Eng 5(5):34–41
Chander S, Vijaya P, Dhyani P (2016) MKF-firefly: hybridization of firefly and multiple kernel-based fuzzy c-means algorithm. Int J Adv Res Comput Commun Eng 5(7):213–216
Veeraiah N, Krishna BT (2018) Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy Naïve Bayes rule. Multim Res 1(1):27–32
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jagdale, B.N., Bakal, J.W. A novel authentication and authorization scheme in P2P networking using location-based privacy. Evol. Intel. 15, 1251–1264 (2022). https://doi.org/10.1007/s12065-020-00375-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12065-020-00375-y