International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 187

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017


Various Authentication Techniques for Trustworthy Pervasive Social Networking

Bhagyashri Mitkari, Dr. Khan Rahat Afreen


Abstract: Pervasive social networking (PSN) helps instantaneous social hobbies at any place and at any time with the support of heterogeneous networks. Sending of data over the web for various purposes has been included as an essential part of technological know-how now days. However, the information dispatched over the web as good knowledge to be retrieved can be hacked with the aid of some other party in a few methods. To furnish the comfortable transmission and receiving of data, more than a few cryptographic schemes have been proposed in the final decade. Among the existing schemes the data integrity shouldn't be ensured in a quantity of facets. Hence, data Hiding Scheme makes use of digital signature authentication, which is used to hide the security key. So as to continue privacy and reap riskless PSN, anonymous digital signature authentication on node trust is predicted in PSN. The literature still lacks critical reports on this predicament. An anonymous authentication scheme for authenticating both pseudonyms and believe levels to support safe PSN with privacy maintenance. The scheme achieves cozy anonymous authentication with anonymity and conditional traceability on the groundwork depend up on Trusted Authority (TA). By way of applying a back-up resolution, it may possibly guarantee communications among nodes for an improved time period even when the TA is not on hand. In addition, the usage of batch-signature verification further reduces the rate of authenticity verification of a gigantic number of messages. Performance analysis and evaluation further show that the proposed scheme is robust with reference to privateer's maintenance, computation complexity, conversation cost, flexibility, reliability, and scalability.


Keywords: Digital Signature Authentication, Pervasive Social Networking PSN, Privacy Preservation, Trust


Edition: Volume 6 Issue 4, April 2017,


Pages: 8 - 10


How to Cite this Article?

Bhagyashri Mitkari, Dr. Khan Rahat Afreen, "Various Authentication Techniques for Trustworthy Pervasive Social Networking", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20172041, Volume 6 Issue 4, April 2017, 8 - 10

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Privacy Preservation'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2144 - 2147

Survey on Privacy Preservation in Content Based Information Retrieval

Bhagyashree V. Khapli, Manjushri A. Mahajan

Share this Article

Similar Articles with Keyword 'Trust'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'Digital'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Similar Articles with Keyword 'Signature'

Downloads: 92

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 94

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Pervasive'

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1574 - 1578

A Survey on Wireless Body Sensor Networks for Health Care Monitoring

M. Devapriya, R. Sudha

Share this Article

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1837 - 1840

A Survey on Enabling Rich Mobile Multimedia Constructed By an Adaptive Mobile Cloud Computing

Mayur P. Band, N.D.Kale

Share this Article

Similar Articles with Keyword 'Social'

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 4

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 627 - 631

A Survey based IoT Model to Maintain Social Distancing

Deepa Sonal

Share this Article

Similar Articles with Keyword 'Networking'

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'PSN'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2040 - 2043

An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform

Akshata S Kori, Manjunatha A S.

Share this Article

Similar Articles with Keyword 'Privacy'

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Similar Articles with Keyword 'Preservation'

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1598 - 1606

A Design and Implementation of Efficient Algorithm for Materialized View Selection with its Preservation in a Data Warehouse Environment

Sapna Choudhary, Roshna Mahajan

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article
Top