Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication

被引:13
|
作者
Papadamou, Kostantinos [1 ]
Zannettou, Savvas [1 ]
Chifor, Bogdan [2 ]
Teican, Sorin [2 ]
Gugulea, George [2 ]
Caponi, Alberto [3 ]
Recupero, Annamaria [3 ]
Pisa, Claudio [3 ]
Bianchi, Giuseppe [4 ]
Steven, Gevers [5 ]
Xenakis, Christos [6 ]
Sirivianos, Michael [1 ]
机构
[1] Cyprus Univ Technol, EECEI, CY-3603 Limassol, Cyprus
[2] CERTSIGN SA, Res & Dev, Bucharest 050881, Romania
[3] Univ Roma Tor Vergata, Res Unit, CNIT, I-00133 Rome, Italy
[4] Univ Roma Tor Vergata, Dept Elect Engn, CNIT, I-00133 Rome, Italy
[5] Verizon Enterprise Solut, F-20147 La Def, France
[6] Univ Pireaus, Dept Digital Syst, Piraeus 18534, Greece
基金
欧盟地平线“2020”;
关键词
Web services; authorization; authentication; encryption; biometrics (access control); SECURITY;
D O I
10.1109/TIFS.2019.2958763
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Current authentication methods on the Web have serious weaknesses. First, services heavily rely on the traditional password paradigm, which diminishes the end-users' security and usability. Second, the lack of attribute-based authentication does not allow anonymity-preserving access to services. Third, users have multiple online accounts that often reflect distinct identity aspects. This makes proving combinations of identity attributes hard on the users. In this paper, we address these weaknesses by proposing a privacy-preserving architecture for device-centric and attribute-based authentication based on: 1) the seamless integration between usable/strong device-centric authentication methods and federated login solutions; 2) the separation of the concerns for Authorization, Authentication, Behavioral Authentication and Identification to facilitate incremental deployability, wide adoption and compliance with NIST assurance levels; and 3) a novel centralized component that allows end-users to perform identity profile and consent management, to prove combinations of fragmented identity aspects, and to perform account recovery in case of device loss. To the best of our knowledge, this is the first effort towards fusing the aforementioned techniques under an integrated architecture. This architecture effectively deems the password paradigm obsolete with minimal modification on the service provider's software stack.
引用
收藏
页码:2183 / 2193
页数:11
相关论文
共 50 条
  • [1] Concepts and languages for privacy-preserving attribute-based authentication
    Camenisch, Jan
    Dubovitskaya, Maria
    Enderlein, Robert R.
    Lehmann, Anja
    Neven, Gregory
    Paquin, Christian
    Preiss, Franz-Stefan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 25 - 44
  • [2] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [3] Attribute-Based Pseudonymity for Privacy-Preserving Authentication in Cloud Services
    Sucasas, Victor
    Mantas, Georgios
    Papaioannou, Maria
    Rodriguez, Jonathan
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 168 - 184
  • [4] A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks
    Guo, Linke
    Zhang, Chi
    Sun, Jinyuan
    Fang, Yuguang
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (09) : 1927 - 1941
  • [5] PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks
    Guo, Linke
    Zhang, Chi
    Sun, Jinyuan
    Fang, Yuguang
    [J]. 2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2012, : 224 - 233
  • [6] Privacy-Preserving Auditing for Attribute-Based Credentials
    Camenisch, Jan
    Lehmann, Anja
    Neven, Gregory
    Rial, Alfredo
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 109 - 127
  • [7] AN ATTRIBUTE-BASED FRAMEWORK FOR PRIVACY PRESERVING IMAGE QUERYING
    Rane, Shantanu
    Sun, Wei
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2012), 2012, : 2649 - 2652
  • [8] Password authentication scheme preserving identity privacy
    Yang, Fuw-Yi
    Hsu, Chih-Wei
    Chiu, Su-Hui
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 443 - 447
  • [9] Concepts Around Privacy-Preserving Attribute-Based Credentials Making Authentication with Anonymous Credentials Practical
    Camenisch, Jan
    [J]. PRIVACY AND IDENTITY MANAGEMENT FOR EMERGING SERVICES AND TECHNOLOGIES, 2014, 421 : 53 - 63
  • [10] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370