Privacy-Preserving Implicit Authentication

被引:0
|
作者
Safa, Nashad Ahmed [1 ]
Safavi-Naini, Reihaneh [1 ]
Shahandashti, Siamak F. [2 ]
机构
[1] Univ Calgary, Calgary, AB T2N 1N4, Canada
[2] Newcastle Univ, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
关键词
Implicit Authentication; User Privacy; Homomorphic Encryption; Provable Security; Behavioural Features;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an implicit authentication system, a user profile is used as an additional factor to strengthen the authentication of mobile users. The profile consists of features that are constructed using the history of user actions on her mobile device over time. The profile is stored on a server and is used to authenticate an access request originated from the device at a later time. An access request will include a vector of recent features measurements on the device that will be matched against the stored features to accept or reject the request. The features however include private information such as user location or web sites they have visited. In this paper we propose privacy-preserving implicit authentication which achieves implicit authentication without revealing unnecessary information about the users' usage profiles to the server. We propose an architecture, give formal security models, and propose constructions with provable security. We consider two security models, namely for cases where the device behaves semi-honestly or maliciously.
引用
收藏
页码:471 / 484
页数:14
相关论文
共 50 条
  • [1] Efficient privacy-preserving implicit authentication
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    COMPUTER COMMUNICATIONS, 2018, 125 : 13 - 23
  • [2] Flexible and Robust Privacy-Preserving Implicit Authentication
    Domingo-Ferrer, Josep
    Wu, Qianhong
    Blanco-Justicia, Alberto
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 18 - 34
  • [3] Privacy-Preserving Fingercode Authentication
    Barni, Mauro
    Bianchi, Tiziano
    Catalano, Dario
    Di Raimondo, Mario
    Labati, Ruggero Donida
    Failla, Pierluigi
    MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 231 - 240
  • [4] Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things
    Wei, Fushan
    Vijayakumar, Pandi
    Kumar, Neeraj
    Zhang, Ruijie
    Cheng, Qingfeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) : 5599 - 5606
  • [5] PRIVACY-PRESERVING AUTHENTICATION USING FINGERPRINT
    Feng, Quan
    Su, Fei
    Cai, Anni
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 8001 - 8018
  • [6] Privacy-preserving authentication using fingerprint
    Feng, Q. (fquan@sina.com), 1600, ICIC International (08):
  • [7] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494
  • [8] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [9] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    International Journal of Information Security, 2013, 12 : 467 - 494
  • [10] Robust Privacy-Preserving Fingerprint Authentication
    Zhang, Ye
    Koushanfar, Farinaz
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 1 - 6