ICT Systems Security and Privacy Protection
Volume 428 of the series IFIP Advances in Information and Communication Technology pp 471-484
Privacy-Preserving Implicit Authentication
- Nashad Ahmed SafaAffiliated withUniversity of Calgary
- , Reihaneh Safavi-NainiAffiliated withUniversity of Calgary
- , Siamak F. ShahandashtiAffiliated withNewcastle University
Abstract
In an implicit authentication system, a user profile is used as an additional factor to strengthen the authentication of mobile users. The profile consists of features that are constructed using the history of user actions on her mobile device over time. The profile is stored on a server and is used to authenticate an access request originated from the device at a later time. An access request will include a vector of recent features measurements on the device that will be matched against the stored features to accept or reject the request. The features however include private information such as user location or web sites they have visited. In this paper we propose privacy-preserving implicit authentication which achieves implicit authentication without revealing unnecessary information about the users’ usage profiles to the server. We propose an architecture, give formal security models, and propose constructions with provable security. We consider two security models, namely for cases where the device behaves semi-honestly or maliciously.
Keywords
Implicit Authentication User Privacy Homomorphic Encryption Provable Security Behavioural Features- Title
- Privacy-Preserving Implicit Authentication
- Book Title
- ICT Systems Security and Privacy Protection
- Book Subtitle
- 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings
- Pages
- pp 471-484
- Copyright
- 2014
- DOI
- 10.1007/978-3-642-55415-5_40
- Print ISBN
- 978-3-642-55414-8
- Online ISBN
- 978-3-642-55415-5
- Series Title
- IFIP Advances in Information and Communication Technology
- Series Volume
- 428
- Series ISSN
- 1868-4238
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- IFIP International Federation for Information Processing
- Additional Links
- Topics
- Keywords
-
- Implicit Authentication
- User Privacy
- Homomorphic Encryption
- Provable Security
- Behavioural Features
- Industry Sectors
- eBook Packages
- Editors
-
-
Nora Cuppens-Boulahia
(1)
-
Frédéric Cuppens
(1)
-
Sushil Jajodia
(2)
-
Anas Abou El Kalam
(3)
-
Thierry Sans
(4)
-
Nora Cuppens-Boulahia
- Editor Affiliations
-
- 1. Télécom Bretagne (Campus Rennes)
- 2. Center for Secure Information Systems, George Mason University
- 3. École Nationale des Sciences Appliquées, Université Cadi Ayyad
- 4. Carnegie Mellon University
- Authors
- Author Affiliations
-
- 5. University of Calgary, Canada
- 6. Newcastle University, UK
Continue reading...
To view the rest of this content please follow the download PDF link above.