Dissemin is shutting down on January 1st, 2025

Published in

Elsevier, Computers and Security, (53), p. 215-233, 2015

DOI: 10.1016/j.cose.2015.05.009

Links

Tools

Export citation

Search in Google Scholar

Reconciling User Privacy and Implicit Authentication for Mobile Devices

Journal article published in 2015 by Siamak F. Shahandashti ORCID, Reihaneh Safavi-Naini, Nashad Ahmed Safa
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

In an implicit authentication system, a user profile is used as an additional factor to strengthen the authentication of mobile users. The profile consists of features that are constructed using the history of user actions on her mobile device over time. The profile is stored on the server and is used to authenticate an access request originated from the device at a later time. An access request will include a vector of recent measurements of the features on the device, that will be subsequently matched against the features stored at the server, to accept or reject the request. The features however include private information such as user location or web sites that have been visited. We propose a privacy-preserving implicit authentication system that achieves implicit authentication without revealing information about the usage profiles of the users to the server. We propose an architecture, give a formal security model and a construction with provable security in two settings where: (i) the device follows the protocol, and (ii) the device is captured and behaves maliciously.