Privacy-Preserving Implicit Authentication

被引:0
|
作者
Safa, Nashad Ahmed [1 ]
Safavi-Naini, Reihaneh [1 ]
Shahandashti, Siamak F. [2 ]
机构
[1] Univ Calgary, Calgary, AB T2N 1N4, Canada
[2] Newcastle Univ, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014 | 2014年 / 428卷
关键词
Implicit Authentication; User Privacy; Homomorphic Encryption; Provable Security; Behavioural Features;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an implicit authentication system, a user profile is used as an additional factor to strengthen the authentication of mobile users. The profile consists of features that are constructed using the history of user actions on her mobile device over time. The profile is stored on a server and is used to authenticate an access request originated from the device at a later time. An access request will include a vector of recent features measurements on the device that will be matched against the stored features to accept or reject the request. The features however include private information such as user location or web sites they have visited. In this paper we propose privacy-preserving implicit authentication which achieves implicit authentication without revealing unnecessary information about the users' usage profiles to the server. We propose an architecture, give formal security models, and propose constructions with provable security. We consider two security models, namely for cases where the device behaves semi-honestly or maliciously.
引用
收藏
页码:471 / 484
页数:14
相关论文
共 50 条
  • [41] Privacy-Preserving Smart Metering with Authentication in a Smart Grid
    Hur, Jun Beom
    Koo, Dong Young
    Shin, Young Joo
    APPLIED SCIENCES-BASEL, 2015, 5 (04): : 1503 - 1527
  • [42] A Privacy-Preserving Roaming Authentication Scheme for Ubiquitous Networks
    Zhou, You-sheng
    Zhou, Jun-feng
    Wang, Feng
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 463 - 471
  • [43] Privacy-preserving continuous authentication using behavioral biometrics
    Baig, Ahmed Fraz
    Eskeland, Sigurd
    Yang, Bian
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (06) : 1833 - 1847
  • [44] A review of privacy-preserving biometric identification and authentication protocols
    Zeng, Li
    Shen, Peisong
    Zhu, Xiaojie
    Tian, Xue
    Chen, Chi
    COMPUTERS & SECURITY, 2025, 150
  • [45] Privacy-preserving and dynamic authentication scheme for smart metering
    Tian, Xiuxia
    Tian, Fuliang
    Zhang, Anqin
    Chen, Xi
    International Journal of Network Security, 2019, 21 (01) : 62 - 70
  • [46] Lightweight and Privacy-Preserving Authentication Protocol for Smart Village
    Panigrahi, Ranjeet Kumar
    Kumar, Raghvendra
    INTERNET TECHNOLOGY LETTERS, 2024,
  • [47] PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
    Heinrich, Alexander
    Hollick, Matthias
    Schneider, Thomas
    Stute, Milan
    Weinert, Christian
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 3577 - 3594
  • [48] Privacy-preserving authentication scheme with full aggregation in VANET
    Zhong, Hong
    Han, Shunshun
    Cui, Jie
    Zhang, Jing
    Xu, Yan
    INFORMATION SCIENCES, 2019, 476 : 211 - 221
  • [49] A Privacy-Preserving Authentication and Pseudonym Revocation Scheme for VANETs
    Qi, Jiayu
    Gao, Tianhan
    IEEE ACCESS, 2020, 8 : 177693 - 177707
  • [50] Privacy-Preserving Mutual Authentication in RFID with Designated Readers
    Fuchun Guo
    Yi Mu
    Willy Susilo
    Vijay Varadharajan
    Wireless Personal Communications, 2017, 96 : 4819 - 4845