A privacy-preserving multifactor authentication system

被引:12
|
作者
Acar, Abbas [1 ]
Liu, Wenyi [2 ]
Beyah, Raheem [2 ]
Akkaya, Kemal [1 ]
Uluagac, Arif Selcuk [1 ]
机构
[1] Florida Int Univ, Sch Elect & Comp Engn, Miami, FL 33172 USA
[2] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
来源
SECURITY AND PRIVACY | 2019年 / 2卷 / 05期
基金
美国国家科学基金会;
关键词
fuzzy hashing; homomorphic encryption; multifactor authentication; privacy-preserving; FULLY HOMOMORPHIC ENCRYPTION; SCHEME;
D O I
10.1002/spy2.88
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, there has been a significant number of works on the development of multifactor authentication (MFA) systems. Traditionally, behavioral biometrics (eg, keystroke dynamics) have been known to have the best usability because they do not require one to know or possess anything-they simply communicate "how you type" to an authenticator. However, though highly usable, MFA approaches that are based on biometrics are highly intrusive, and users' sensitive information is exposed to untrusted servers. To address this privacy concern, in this paper, we present a privacy-preserving MFA system for computer users, called PINTA. In PINTA, the second factor is a hybrid behavioral profile user, while the first authentication factor is a password. The hybrid profile of the user includes host-based and network flow-based features. Since the features include users' sensitive information, it needs to be protected from untrusted parties. To protect users' sensitive profiles and to handle the varying nature of the user profiles, we adopt two cryptographic methods: Fuzzy hashing and fully homomorphic encryption (FHE). Our results show that PINTA can successfully validate legitimate users and detect impostors. Although the results are promising, the trade-off for privacy preservation is a slight reduction in performance compared with traditional identity-based MFA techniques.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] A privacy-preserving multifactor authentication system (vol 2, e88, 2019)
    Acar, Abbas
    Liu, Wenyi
    Beyah, Raheem
    Akkaya, Kemal
    Uluagac, Arif Selcuk
    [J]. SECURITY AND PRIVACY, 2019, 2 (06):
  • [2] VoiceSketch: a Privacy-Preserving Voiceprint Authentication System
    Yan, Baochen
    Zhang, Rui
    Yan, Zheng
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 623 - 630
  • [3] Privacy-Preserving Implicit Authentication
    Safa, Nashad Ahmed
    Safavi-Naini, Reihaneh
    Shahandashti, Siamak F.
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 471 - 484
  • [4] Privacy-Preserving Fingercode Authentication
    Barni, Mauro
    Bianchi, Tiziano
    Catalano, Dario
    Di Raimondo, Mario
    Labati, Ruggero Donida
    Failla, Pierluigi
    [J]. MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 231 - 240
  • [5] Efficient privacy-preserving implicit authentication
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    [J]. COMPUTER COMMUNICATIONS, 2018, 125 : 13 - 23
  • [6] PRIVACY-PRESERVING AUTHENTICATION USING FINGERPRINT
    Feng, Quan
    Su, Fei
    Cai, Anni
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 8001 - 8018
  • [7] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    [J]. International Journal of Information Security, 2013, 12 : 467 - 494
  • [8] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [9] Robust Privacy-Preserving Fingerprint Authentication
    Zhang, Ye
    Koushanfar, Farinaz
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 1 - 6
  • [10] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494