期刊
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
卷 25, 期 4, 页码 2557-2571出版社
SPRINGER
DOI: 10.1007/s10586-021-03390-5
关键词
Anonymous authentication; Conditional privacy; Soft computing; Artificial intelligence; Online education system; IoT
资金
- PR of China Ministry of Education Distinguished Possessor Grant [MS2017BJKJ003]
In recent years, OES has greatly improved with the development of technology, providing learners with the opportunity to predict and access learning resources. However, existing authentication schemes face challenges such as authentication delay, computation complexity, communication cost, and user privacy.
In recent years, online education systems (OES) are improved tremendously with the development of information communication technology. Also, OES provides the opportunity for the learners to predict and access the learning resources using Internet-of-Things (IoT) devices and it provides learning flexibility through the various artificial intelligence and soft computing approaches. The physical verification of the traditional education system is replaced with a secure authentication process for a human-centered predictive intelligence system. Many authentication schemes are available to provide authentication in human predictive OES, but they are suffering from authentication delay, computation complexity, communication cost, and user privacy. Hence, it is very difficult to provide data security using resource-limited IoT devices. In this work, a secure and efficient anonymous authentication scheme is introduced to avoid the mischievous learners and subject experts entering into OES. Also, the proposed scheme provides the essential security requirement of user privacy to OES users until they behave properly. If any chance for dispute, the system discloses the privacy of misbehaving users. The security and performance analysis section ensures that the proposed system provides a secure infrastructure to support sustainable education using resource-limited IoT devices by consuming very little computation and communication delay compared with other existing schemes.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据