Abstract
In recent years, online education systems (OES) are improved tremendously with the development of information communication technology. Also, OES provides the opportunity for the learners to predict and access the learning resources using Internet-of-Things (IoT) devices and it provides learning flexibility through the various artificial intelligence and soft computing approaches. The physical verification of the traditional education system is replaced with a secure authentication process for a human-centered predictive intelligence system. Many authentication schemes are available to provide authentication in human predictive OES, but they are suffering from authentication delay, computation complexity, communication cost, and user privacy. Hence, it is very difficult to provide data security using resource-limited IoT devices. In this work, a secure and efficient anonymous authentication scheme is introduced to avoid the mischievous learners and subject experts entering into OES. Also, the proposed scheme provides the essential security requirement of user privacy to OES users until they behave properly. If any chance for dispute, the system discloses the privacy of misbehaving users. The security and performance analysis section ensures that the proposed system provides a secure infrastructure to support sustainable education using resource-limited IoT devices by consuming very little computation and communication delay compared with other existing schemes.
Similar content being viewed by others
References
Liagkou, V., Stylios, C., Petunin, A.: Handling privacy and concurrency in an online educational evaluation system. Balt. J. Mod. Comput. 7(1), 86–98 (2019)
Zhao, Y., Li, S., Jiang, L.: Secure and efficient user authentication scheme based on password and smart card for multiserver environment. Secur. Commun. Netw. 2018(1), 1–13 (2018)
Konan, M., Wang, W.: A secure mutual batch authentication scheme for patient data privacy preserving in WBAN. Sensors 19(7), 1608 (2019)
Agarkar, A., Agrawal, H.: LRSPPP: lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid. Heliyon 5(3), e01321 (2019)
Adetoba, B.T., Awodele, O., Kuyoro, S.O.: E-learning security issues and challenges: a review. J. Sci. Res. Stud. 3(5), 96–100 (2016)
Labrecque, L., Markos, E., Darmody, A.: Addressing online behavioral advertising and privacy implications: a comparison of passive versus active learning approaches. J. Mark. Educ. 2(33), 273–284 (2019)
Attwell, G.: E-portfolios—the DNA of the personal learning environment? J. e-Learn. Knowl. Soc. 3(2), 39–61 (2007)
Barik, N., Karforma, S.: Risks and remedies in e-learning system. Int. J. Netw. Secur. Appl. 4(1), 51–59 (2012)
Pastore, R., Chellman, A.: Motivations for residential students to participate in online courses. Q. Rev. Distance Educ. 10(3), 263–277 (2009)
Saleh, M.M., Wahid, F.A.: A review of security threats by the unauthorized in the e-learning. Int. J. Comput. Technol. 14(11), 6240–6243 (2015)
Tarus, K., Gichoya, D., Muumbo, A.M.: Challenges of implementing e-learning in Kenya: a case of Kenyan public universities. Int. Rev. Res. Open Distrib. Learn. 16(1), 120–141 (2015)
Amin, R., Islam, S., Biswas, G., Giri, D., Khan, M., Kumar, N.: A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur. Commun. Netw. 9(17), 4650–4666 (2016)
Wang, M., Liu, D., Zhu, L., Xu, Y., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98(7), 685–708 (2014)
Memon, I., Hussain, I., Akhtar, R., Chen, G.: Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wirel. Pers. Commun. 84(2), 1487–1508 (2014)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004)
Gong, Z., Long, Y., Hong, X., Chen, K.: Two certificate-less aggregate signatures from bilinear maps. In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), August 2007, vol. 3, pp. 188–193
Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)
Lu, R., Lin, X., Luan, T.-H.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)
Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711–1720 (2016)
Cygwin: Linux Environment Emulator for Windows. http://www.cygwin.com/. Accessed 3 Feb 2021
Zeng, X., Xu, G., Zheng, X., Xiang, Y., Zhou, W.: E-AUA: an efficient anonymous user authentication protocol for mobile IoT. IEEE Access 6(2), 1506–1519 (2019)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Advances in Cryptology-Asiacrypt’03, LNCS, vol. 2894, pp. 452–473. Springer, 2003
Chen, X., Zhang, F., Kim, K.: A new ID-based group signature scheme from bilinear pairings. In: Proceedings of WISA’03, LNCS, vol. 2908, pp. 585–592. Springer, 2003
Zhang, Z., Wong, D., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Proceedings of ACNS 2006, LNCS, vol. 3989, pp. 293–308. Springer, 2006
Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based sign-cryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)
Cagalaban, G., Kim, S.: Towards a secure patient information access control in ubiquitous healthcare systems using identity-based sign-cryption. In: Proceedings of the 13th International Conference on Advanced Communication Technology, Seoul, Korea, pp. 863–867, 2011.
Braeken, A., Porambage, P., Stojmenovic, M., Lambrinos, L.: eDAAAS: efficient distributed anonymous authentication and access in smart homes. Int. J. Distrib. Sens. Netw. 12(12), 1–11 (2016)
Liu, J., Zhang, Z., Chen, X., Kwak, K.S.: Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2014)
Mahdi, A.O., Alhabbash, M.I., Abu-Naser, S.S.: An intelligent tutoring system for teaching advanced topics in information security. Worldw. J. Multidiscip. Res. Dev. 2(12), 1–9 (2016)
Ikedinachi, A.P., Misra, S., Assibong, P.A., Olu-Owolabi, E.F., Maskeliūnas, R., Damasevicius, R.: Artificial intelligence, smart classrooms and online education in the 21st century: implications for human development. J. Cases Inf. Technol. 21(3), 66–79 (2019)
Popenici, S.A., Kerr, S.: Exploring the impact of artificial intelligence on teaching and learning in higher education. Res. Pract. Technol. Enhanc Learn. 12(1), 22 (2017)
Cukurova, M., Kent, C., Luckin, R.: Artificial intelligence and multimodal data in the service of human decision-making: a case study in debate tutoring. Br. J. Educ. Technol. 50(6), 3032–3046 (2019)
Vijayakumar, P., Obaidat, M., Azees, M.: SK Hafizul Islam, N Kumar, “Efficient and secure anonymous authentication with location privacy for IoT-based WBANs.” IEEE Trans. Ind. Inform. (2019). https://doi.org/10.1109/TII.2019.2925071
Vijayakumar, P., Chang, V., Jegatha Deborah, L., Balusamy, B., Shynu, P.G.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst. 78, 943–955 (2018)
Obaidat, M.S., Traore, I., Woungang, I.: Biometric-Based Physical and Cybersecurity Systems. Springer, Cham (2019)
Obaidat, M.S., Boudriga, N.: Security of e-Systems and Computer Networks. Cambridge University Press, New York (2007)
Vijayakumar, P., Azees, M., Chang, V., Deborah, J., Balusamy, B.: Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust. Comput. 20(3), 2439–2450 (2017)
Xia, X., Ji, S., Vijayakumar, P., Shen, J., Rodrigues, J.J.P.C.: An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities. Int. J. Distrib. Sens. Netw. (2021). https://doi.org/10.1177/15501477211026804
Azees, M., Vijayakumar, P., Karuppiah, M., Nayyar, A.: An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wirel. Netw. 27(3), 2119–2130 (2021)
Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. J. Inf. Secur. Appl. 19(4–5), 282–294 (2014)
Karuppiah, M., Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3), 2055–2078 (2015)
Acknowledgment
This work is supported in part by PR of China Ministry of Education Distinguished Possessor Grant given to Prof. Obaidat under number: MS2017BJKJ003.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jegadeesan, S., Obaidat, M.S., Vijayakumar, P. et al. Efficient privacy-preserving anonymous authentication scheme for human predictive online education system. Cluster Comput 25, 2557–2571 (2022). https://doi.org/10.1007/s10586-021-03390-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-021-03390-5