A Multi-factor Re-authentication Framework with User Privacy

被引:0
|
作者
Uluagac, A. Selcuk [1 ]
Liu, Wenyi [2 ]
Beyah, Raheem [2 ]
机构
[1] Florida Int Univ, Elect & Comp Engn Dept, Miami, FL 33173 USA
[2] Georgia Inst Technol, GT CAP Grp, Sch ECE, Atlanta, GA 30332 USA
关键词
Re-authentication in Cloud; Fuzzy Hashing; Fully Homomorphic Encryption; Privacy-Preserving Reauthentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Continuous re-authentication of users is a must to protect connections with long duration against any malicious activity. Users can be re-authenticated in numerous ways. One popular way is an approach that requires the presentation of two or more authentication factors (i.e., knowledge, possession, identity) called Multi-factor authentication (MFA). Given the market dominance of ubiquitous computing systems (e.g., cloud), MFA systems have become vital in re-authenticating users. Knowledge factor (i.e., passwords) is the most ubiquitous authentication factor; however, forcing a user to re-enter the primary factor, a password, at frequent intervals could significantly lower the usability of the system. Unfortunately, an MFA system with a possession factor (e.g., Security tokens) usually depends on the distribution of some specific device, which is cumbersome and not user-friendly. Similarly, MFA systems with an identity factor (e.g., physiological biometrics, keystroke pattern) suffer from a relatively low deployability and are highly intrusive and expose users sensitive information to untrusted servers. These servers can keep physically identifying elements of users, long after the user ends the relationship with the server. To address these concerns, in this poster, we introduce our initial design of a privacy-preserving multi-factor re-authentication framework. The first factor is a password while the second factor is a hybrid profile of user behavior with a large combination of host-and network-based features. Our initial results are very promising as our framework can successfully validate legitimate users while detecting impostors.
引用
收藏
页码:504 / 505
页数:2
相关论文
共 50 条
  • [1] DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps
    Amini, Sara
    Noroozi, Vahid
    Pande, Amit
    Gupte, Satyajit
    Yu, Philip S.
    Kanich, Chris
    [J]. CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, : 2027 - 2035
  • [2] Privacy preserving multi-factor authentication with biometrics
    Bhargav-Spantzel, Abhilasha
    Squicciarini, Anna
    Modi, Shimon
    Young, Matthew
    Bertino, Elisa
    Elliott, Stephen
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) : 529 - 560
  • [3] Implicit User Re-authentication for Mobile Devices
    Yazji, Sausan
    Chen, Xi
    Dick, Robert P.
    Scheuermann, Peter
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2009, 5585 : 325 - +
  • [4] Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
    Mostafa, Ayman Mohamed
    Ezz, Mohamed
    Elbashir, Murtada K.
    Alruily, Meshrif
    Hamouda, Eslam
    Alsarhani, Mohamed
    Said, Wael
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (19):
  • [5] A Systematic Review on Multi-Factor Authentication Framework
    Syahreen, Muhammad
    Hafizah, Noor
    Maarop, Nurazean
    Maslinan, Mayasarah
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 1043 - 1050
  • [6] A lightweight multi-factor mobile user authentication scheme
    Sun, Jianguo
    Zhong, Qi
    Kou, Liang
    Wang, Wenshan
    Da, Qingan
    Lin, Yun
    [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 831 - 836
  • [7] Multi-factor EEG-based User Authentication
    Tien Pham
    Ma, Wanli
    Dat Tran
    Phuoc Nguyen
    Dinh Phung
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2014, : 4029 - 4034
  • [8] A Novel Approach to Design of User Re-Authentication Systems
    Jagadeesan, Harini
    Hsiao, Michael S.
    [J]. 2009 IEEE 3RD INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS, 2009, : 379 - 384
  • [9] Ensuring privacy of biometric factors in multi-factor authentication systems
    Apampa, Kikelomo Maria
    Zhang, Tian
    Wills, Gary B.
    Argles, David
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 44 - 49
  • [10] A Multi-Factor Authentication Framework for Secure Access to Blockchain
    Sahan, Sercan
    Ekici, Adil Furkan
    Bahtiyar, Serif
    [J]. PROCEEDINGS OF THE 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS (ICCTA 2019), 2019, : 160 - 164