4 research outputs found

    Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities

    Get PDF
    Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile devices, the expectations of a frictionless experience and the diverse user environments will challenge the way users are authenticated. Consumers demand secure and privacy-aware access from any device, whenever and wherever they are, without any obstacles. This paper reviews emerging trends and challenges with frictionless authentication systems and identifies opportunities for further research related to the enrollment of users, the usability of authentication schemes, as well as security and privacy trade-offs of mobile and wearable continuous authentication systems.Comment: published at the 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017

    Leveraging user-related internet of things for continuous authentication: a survey

    Get PDF
    Among all Internet of Things (IoT) devices, a subset of them are related to users. Leveraging these user-related IoT elements, itis possible to ensure the identity of the user for a period of time, thus avoiding impersonation. This need is known as ContinuousAuthentication (CA). Since 2009, a plethora of IoT-based CA academic research and industrial contributions have been proposed. Weoffer a comprehensive overview of 58 research papers regarding the main components of such a CA system. The status of the industryis studied as well, covering 32 market contributions, research projects and related standards. Lessons learned, challenges and openissues to foster further research in this area are finally presented.This work was supported by the MINECO grant TIN2016-79095-C2-2-R (SMOG-DEV) and by the CAM grants S2013/ICE-3095 (CIBERDINE) and P2018/TCS4566 (CYNAMON-CM) both co-funded with European FEDER funds

    Improving resilience of behaviometric based continuous authentication with multiple accelerometers

    No full text
    Behaviometrics in multi-factor authentication schemes continuously assess behavior patterns of a subject to recognize and verify his identity. In this work we challenge the practical feasibility and the resilience of accelerometer-based gait analysis as a behaviometric under sensor displacement conditions. To improve misauthentication resistance, we present and evaluate a solution using multiple accelerometers on 7 positions on the body during different activities and compare the effectiveness with Gradient-Boosted Trees classification. From a security point of view, we investigate the feasibility of zero and non-zero effort attacks on gait analysis as a behaviometric. Our experimental results with data from 12 individuals show an improvement in terms of EER with about 2% (from 5% down to 3%), with an increased resilience against observation attacks. When trained to defend against such attacks, we observe no decrease in classification performance.status: accepte

    Data and Applications Security and Privacy XXXI

    No full text
    The proceedings contain 30 papers. The special focus in this conference is on Data and Applications Security and Privacy. The topics include: Resilient reference monitor for distributed access control via moving target defense; preventing unauthorized data flows; object-tagged RBAC model for the hadoop ecosystem; identification of access control policy sentences from natural language policy documents; fast distributed evaluation of stateful attribute-based access control policies; Gaussian mixture models for classification and hypothesis tests under differential privacy; differentially private k skyband query answering through adaptive spatial decomposition; mutually private location proximity detection with access control; privacy-preserving community-aware trending topic detection in online social media; privacy-preserving outlier detection for data streams; undoing of privacy policies on Facebook; towards actionable mission impact assessment in the context of cloud computing; reducing security risks of clouds through virtual machine placement; firewall policies provisioning through sdn in the cloud; budget-constrained result integrity verification of outsourced data mining computations; searchable encryption to reduce encryption degradation in adjustably encrypted databases; efficient protocols for private database queries; toward group based user-attribute policies in azure-like access control systems; high-speed high security public key encryption with keyword search; keylogger detection using a decoy keyboard; the fallout of key compromise in a proxy-mediated key agreement protocol; improving resilience of behaviometric based continuous authentication with multiple accelerometers; a content-aware trust index for online review spam detection and securing web applications with predicate access control
    corecore