Browse by author
Lookup NU author(s): Dr Siamak Fayyaz Shahandashti
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND).
In an implicit authentication system, a user profile is used as an additional factor to strengthen the authentication of mobile users. The profile consists of features that are constructed using the history of user actions on her mobile device over time. The profile is stored on a server and is used to authenticate an access request originated from the device at a later time. An access request will include a vector of recent features measurements on the device that will be matched against the stored features to accept or reject the request. The features however include private information such as user location or web sites they have visited. In this paper we propose privacy-preserving implicit authentication which achieves implicit authentication without revealing unnecessary information about the users’ usage profiles to the server. We propose an architecture, give formal security models, and propose constructions with provable security. We consider two security models, namely for cases where the device behaves semi-honestly or maliciously.
Author(s): Safa NA, Safavi-Naini R, Shahandashti SF
Editor(s): Cuppens-Boulahia, N; Cuppens, F; Jajodia, S; Abou El Kalam, A; Sans, T
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference (SEC 2014)
Year of Conference: 2014
Acceptance date: 01/01/1900
Date deposited: 10/05/2016
Publisher: Springer Berlin Heidelberg
Library holdings: Search Newcastle University Library for this item
Series Title: IFIP Advances in Information and Communication Technology