Skip to main content

Advertisement

Log in

Efficient privacy-preserving anonymous authentication scheme for human predictive online education system

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

In recent years, online education systems (OES) are improved tremendously with the development of information communication technology. Also, OES provides the opportunity for the learners to predict and access the learning resources using Internet-of-Things (IoT) devices and it provides learning flexibility through the various artificial intelligence and soft computing approaches. The physical verification of the traditional education system is replaced with a secure authentication process for a human-centered predictive intelligence system. Many authentication schemes are available to provide authentication in human predictive OES, but they are suffering from authentication delay, computation complexity, communication cost, and user privacy. Hence, it is very difficult to provide data security using resource-limited IoT devices. In this work, a secure and efficient anonymous authentication scheme is introduced to avoid the mischievous learners and subject experts entering into OES. Also, the proposed scheme provides the essential security requirement of user privacy to OES users until they behave properly. If any chance for dispute, the system discloses the privacy of misbehaving users. The security and performance analysis section ensures that the proposed system provides a secure infrastructure to support sustainable education using resource-limited IoT devices by consuming very little computation and communication delay compared with other existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Liagkou, V., Stylios, C., Petunin, A.: Handling privacy and concurrency in an online educational evaluation system. Balt. J. Mod. Comput. 7(1), 86–98 (2019)

    Google Scholar 

  2. Zhao, Y., Li, S., Jiang, L.: Secure and efficient user authentication scheme based on password and smart card for multiserver environment. Secur. Commun. Netw. 2018(1), 1–13 (2018)

    Article  Google Scholar 

  3. Konan, M., Wang, W.: A secure mutual batch authentication scheme for patient data privacy preserving in WBAN. Sensors 19(7), 1608 (2019)

    Article  Google Scholar 

  4. Agarkar, A., Agrawal, H.: LRSPPP: lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid. Heliyon 5(3), e01321 (2019)

    Article  Google Scholar 

  5. Adetoba, B.T., Awodele, O., Kuyoro, S.O.: E-learning security issues and challenges: a review. J. Sci. Res. Stud. 3(5), 96–100 (2016)

    Google Scholar 

  6. Labrecque, L., Markos, E., Darmody, A.: Addressing online behavioral advertising and privacy implications: a comparison of passive versus active learning approaches. J. Mark. Educ. 2(33), 273–284 (2019)

    Google Scholar 

  7. Attwell, G.: E-portfolios—the DNA of the personal learning environment? J. e-Learn. Knowl. Soc. 3(2), 39–61 (2007)

    Google Scholar 

  8. Barik, N., Karforma, S.: Risks and remedies in e-learning system. Int. J. Netw. Secur. Appl. 4(1), 51–59 (2012)

    Google Scholar 

  9. Pastore, R., Chellman, A.: Motivations for residential students to participate in online courses. Q. Rev. Distance Educ. 10(3), 263–277 (2009)

    Google Scholar 

  10. Saleh, M.M., Wahid, F.A.: A review of security threats by the unauthorized in the e-learning. Int. J. Comput. Technol. 14(11), 6240–6243 (2015)

    Article  Google Scholar 

  11. Tarus, K., Gichoya, D., Muumbo, A.M.: Challenges of implementing e-learning in Kenya: a case of Kenyan public universities. Int. Rev. Res. Open Distrib. Learn. 16(1), 120–141 (2015)

    Google Scholar 

  12. Amin, R., Islam, S., Biswas, G., Giri, D., Khan, M., Kumar, N.: A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur. Commun. Netw. 9(17), 4650–4666 (2016)

    Article  Google Scholar 

  13. Wang, M., Liu, D., Zhu, L., Xu, Y., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98(7), 685–708 (2014)

    Article  MathSciNet  Google Scholar 

  14. Memon, I., Hussain, I., Akhtar, R., Chen, G.: Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wirel. Pers. Commun. 84(2), 1487–1508 (2014)

    Article  Google Scholar 

  15. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004)

    Article  MathSciNet  Google Scholar 

  16. Gong, Z., Long, Y., Hong, X., Chen, K.: Two certificate-less aggregate signatures from bilinear maps. In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), August 2007, vol. 3, pp. 188–193

  17. Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)

    Article  Google Scholar 

  18. Lu, R., Lin, X., Luan, T.-H.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)

    Article  Google Scholar 

  19. Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711–1720 (2016)

    Article  Google Scholar 

  20. Cygwin: Linux Environment Emulator for Windows. http://www.cygwin.com/. Accessed 3 Feb 2021

  21. Zeng, X., Xu, G., Zheng, X., Xiang, Y., Zhou, W.: E-AUA: an efficient anonymous user authentication protocol for mobile IoT. IEEE Access 6(2), 1506–1519 (2019)

    Google Scholar 

  22. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Advances in Cryptology-Asiacrypt’03, LNCS, vol. 2894, pp. 452–473. Springer, 2003

  23. Chen, X., Zhang, F., Kim, K.: A new ID-based group signature scheme from bilinear pairings. In: Proceedings of WISA’03, LNCS, vol. 2908, pp. 585–592. Springer, 2003

  24. Zhang, Z., Wong, D., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Proceedings of ACNS 2006, LNCS, vol. 3989, pp. 293–308. Springer, 2006

  25. Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based sign-cryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)

    Article  Google Scholar 

  26. Cagalaban, G., Kim, S.: Towards a secure patient information access control in ubiquitous healthcare systems using identity-based sign-cryption. In: Proceedings of the 13th International Conference on Advanced Communication Technology, Seoul, Korea, pp. 863–867, 2011.

  27. Braeken, A., Porambage, P., Stojmenovic, M., Lambrinos, L.: eDAAAS: efficient distributed anonymous authentication and access in smart homes. Int. J. Distrib. Sens. Netw. 12(12), 1–11 (2016)

    Article  Google Scholar 

  28. Liu, J., Zhang, Z., Chen, X., Kwak, K.S.: Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2014)

    Article  Google Scholar 

  29. Mahdi, A.O., Alhabbash, M.I., Abu-Naser, S.S.: An intelligent tutoring system for teaching advanced topics in information security. Worldw. J. Multidiscip. Res. Dev. 2(12), 1–9 (2016)

    Google Scholar 

  30. Ikedinachi, A.P., Misra, S., Assibong, P.A., Olu-Owolabi, E.F., Maskeliūnas, R., Damasevicius, R.: Artificial intelligence, smart classrooms and online education in the 21st century: implications for human development. J. Cases Inf. Technol. 21(3), 66–79 (2019)

    Article  Google Scholar 

  31. Popenici, S.A., Kerr, S.: Exploring the impact of artificial intelligence on teaching and learning in higher education. Res. Pract. Technol. Enhanc Learn. 12(1), 22 (2017)

    Article  Google Scholar 

  32. Cukurova, M., Kent, C., Luckin, R.: Artificial intelligence and multimodal data in the service of human decision-making: a case study in debate tutoring. Br. J. Educ. Technol. 50(6), 3032–3046 (2019)

    Article  Google Scholar 

  33. Vijayakumar, P., Obaidat, M., Azees, M.: SK Hafizul Islam, N Kumar, “Efficient and secure anonymous authentication with location privacy for IoT-based WBANs.” IEEE Trans. Ind. Inform. (2019). https://doi.org/10.1109/TII.2019.2925071

    Article  Google Scholar 

  34. Vijayakumar, P., Chang, V., Jegatha Deborah, L., Balusamy, B., Shynu, P.G.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst. 78, 943–955 (2018)

    Article  Google Scholar 

  35. Obaidat, M.S., Traore, I., Woungang, I.: Biometric-Based Physical and Cybersecurity Systems. Springer, Cham (2019)

    Book  Google Scholar 

  36. Obaidat, M.S., Boudriga, N.: Security of e-Systems and Computer Networks. Cambridge University Press, New York (2007)

    Book  Google Scholar 

  37. Vijayakumar, P., Azees, M., Chang, V., Deborah, J., Balusamy, B.: Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust. Comput. 20(3), 2439–2450 (2017)

    Article  Google Scholar 

  38. Xia, X., Ji, S., Vijayakumar, P., Shen, J., Rodrigues, J.J.P.C.: An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities. Int. J. Distrib. Sens. Netw. (2021). https://doi.org/10.1177/15501477211026804

    Article  Google Scholar 

  39. Azees, M., Vijayakumar, P., Karuppiah, M., Nayyar, A.: An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wirel. Netw. 27(3), 2119–2130 (2021)

    Article  Google Scholar 

  40. Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. J. Inf. Secur. Appl. 19(4–5), 282–294 (2014)

    Google Scholar 

  41. Karuppiah, M., Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3), 2055–2078 (2015)

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported in part by PR of China Ministry of Education Distinguished Possessor Grant given to Prof. Obaidat under number: MS2017BJKJ003.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marimuthu Karuppiah.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jegadeesan, S., Obaidat, M.S., Vijayakumar, P. et al. Efficient privacy-preserving anonymous authentication scheme for human predictive online education system. Cluster Comput 25, 2557–2571 (2022). https://doi.org/10.1007/s10586-021-03390-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03390-5

Keywords

Navigation