Privacy-Preserving Implicit Authentication

被引:0
|
作者
Safa, Nashad Ahmed [1 ]
Safavi-Naini, Reihaneh [1 ]
Shahandashti, Siamak F. [2 ]
机构
[1] Univ Calgary, Calgary, AB T2N 1N4, Canada
[2] Newcastle Univ, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014 | 2014年 / 428卷
关键词
Implicit Authentication; User Privacy; Homomorphic Encryption; Provable Security; Behavioural Features;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an implicit authentication system, a user profile is used as an additional factor to strengthen the authentication of mobile users. The profile consists of features that are constructed using the history of user actions on her mobile device over time. The profile is stored on a server and is used to authenticate an access request originated from the device at a later time. An access request will include a vector of recent features measurements on the device that will be matched against the stored features to accept or reject the request. The features however include private information such as user location or web sites they have visited. In this paper we propose privacy-preserving implicit authentication which achieves implicit authentication without revealing unnecessary information about the users' usage profiles to the server. We propose an architecture, give formal security models, and propose constructions with provable security. We consider two security models, namely for cases where the device behaves semi-honestly or maliciously.
引用
收藏
页码:471 / 484
页数:14
相关论文
共 50 条
  • [31] Privacy-Preserving and Undeniable Authentication for Mobile RFID Tags
    Wei, Jiannan
    Li, Nan
    2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2019,
  • [32] Hybrid conditional privacy-preserving authentication scheme for VANETs
    Shibin Wang
    Kele Mao
    Furui Zhan
    Dong Liu
    Peer-to-Peer Networking and Applications, 2020, 13 : 1600 - 1615
  • [33] Privacy-Preserving Authentication Based on Group Signature for VANETs
    Zhu, Xiaoyan
    Jiang, Shunrong
    Wang, Liangmin
    Li, Hui
    Zhang, Weidong
    Li, Zan
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 4609 - 4614
  • [34] Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
    Jo, Hyo Jin
    Paik, Jung Ha
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (07) : 1469 - 1481
  • [35] Privacy-Preserving Universal Authentication Protocol for Wireless Communications
    He, Daojing
    Bu, Jiajun
    Chan, Sammy
    Chen, Chun
    Yin, Mingjian
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 431 - 436
  • [36] Privacy-preserving continuous authentication using behavioral biometrics
    Ahmed Fraz Baig
    Sigurd Eskeland
    Bian Yang
    International Journal of Information Security, 2023, 22 : 1833 - 1847
  • [37] A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain
    Gao, Sheng
    Su, Qianqian
    Zhang, Rui
    Zhu, Jianming
    Sui, Zhiyuan
    Wang, Junsheng
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [38] Privacy-Preserving Authentication Systems Using Smart Devices
    Malina, Lukas
    Hajny, Jan
    Martinasek, Zdenek
    2016 39TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2016, : 11 - 14
  • [39] Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs
    Zhou, Xiaotong
    Luo, Min
    Vijayakumar, Pandi
    Peng, Cong
    He, Debiao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (07) : 7863 - 7875
  • [40] A comprehensive survey on authentication and privacy-preserving schemes in VANETs
    Mundhe, Pravin
    Verma, Shekhar
    Venkatesan, S.
    COMPUTER SCIENCE REVIEW, 2021, 41