Skip to main content

2020 | OriginalPaper | Buchkapitel

Easy Identity Management and Enhanced Security in Account Linking

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Users in this era are experiencing inconvenient usability problems while signing in and out of their multiple devices and services. Also, an unpleasant leak of personal information has become another inconvenience and threat that users cannot avoid while managing them. In this environment, usability and security become more important, however these two work in the trade-off relationship so that it requires a new UX solution. In this paper, with Account linking, we suggest improving usability while enhancing security by connecting key account and service accounts permanently. Account linking shortens the steps of sign-in so that it releases users from the burden of remembering multiple IDs and passwords by integrating key account and service account. Its benefit will be maximized when using a shared device where users need to sign in not only the device but also individual services one by one. In addition, it blocks the hazard of personal data leak as it enables signing out all services at once and prevents data remaining on a shared device. Likewise, Account linking is expected to enhance usability and security on multi-device, and multi-user environments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Safaei, B., Monazzah, A.M.H., Bafroei, M.B., Ejlali, A.: Reliability side-effects in internet of things application layer protocols. In: 2nd International Conference on System Reliability and Safety (ICSRS), pp. 207–212. IEEE (2017) Safaei, B., Monazzah, A.M.H., Bafroei, M.B., Ejlali, A.: Reliability side-effects in internet of things application layer protocols. In: 2nd International Conference on System Reliability and Safety (ICSRS), pp. 207–212. IEEE (2017)
2.
Zurück zum Zitat Oh, S., Yoo, H., Jeong, D.R., Bui, D.H., Shin, I.: Mobile plus: multi-device mobile platform for cross-device functionality sharing. In: 15th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 332–344. ACM (2017) Oh, S., Yoo, H., Jeong, D.R., Bui, D.H., Shin, I.: Mobile plus: multi-device mobile platform for cross-device functionality sharing. In: 15th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 332–344. ACM (2017)
3.
Zurück zum Zitat Braz, C., Seffah, A., M’Raihi, D.: Designing a trade-off between usability and security: a metrics based-model. In: IFID Conference on Human-Computer Interaction (INTERACT), pp. 114–126. Springer, Heidelberg (2007) Braz, C., Seffah, A., M’Raihi, D.: Designing a trade-off between usability and security: a metrics based-model. In: IFID Conference on Human-Computer Interaction (INTERACT), pp. 114–126. Springer, Heidelberg (2007)
5.
Zurück zum Zitat Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: 9th Workshop on the Economics of Information Security (WEIS) (2010) Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: 9th Workshop on the Economics of Information Security (WEIS) (2010)
6.
Zurück zum Zitat Wijayarathna, C., Arachchilage, N.A.G.: An empirical usability analysis of the google authentication API. In: Evaluation and Assessment on Software Engineering (EASE), pp. 268–274. Association for Computing Machinery (2019) Wijayarathna, C., Arachchilage, N.A.G.: An empirical usability analysis of the google authentication API. In: Evaluation and Assessment on Software Engineering (EASE), pp. 268–274. Association for Computing Machinery (2019)
7.
Zurück zum Zitat Teng, Z., Zhang, P., Li, X., Nock, W., Rodriguez-Cancio, M., White, J., Schmidt, D. C., Gilmore, D., Nesbitt, J.C.: Authentication and usability in mHealth apps. In: 20th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom). IEEE (2018) Teng, Z., Zhang, P., Li, X., Nock, W., Rodriguez-Cancio, M., White, J., Schmidt, D. C., Gilmore, D., Nesbitt, J.C.: Authentication and usability in mHealth apps. In: 20th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom). IEEE (2018)
8.
Zurück zum Zitat Leiba, B.: Oauth web authorization protocol. J. IEEE Internet Comput. 16(1), 74–77 (2012)CrossRef Leiba, B.: Oauth web authorization protocol. J. IEEE Internet Comput. 16(1), 74–77 (2012)CrossRef
9.
Zurück zum Zitat Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J., Seamons, K.: A usability study of five two-factor authentication methods. In: 15th Symposium on Usable Privacy and Security, pp. 357–370. USENIX (2019) Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J., Seamons, K.: A usability study of five two-factor authentication methods. In: 15th Symposium on Usable Privacy and Security, pp. 357–370. USENIX (2019)
10.
Zurück zum Zitat Acemyan, C.Z., Kortum, P., Xiong, J., Wallach, D.S.: 2FA might be secure, but it’s not usable: a summative usability assessment of google’s two-factor authentication (2FA) methods. Hum. Fact. Ergon. Soc. Ann. Meet. 62(1), 1141–1145 (2018) Acemyan, C.Z., Kortum, P., Xiong, J., Wallach, D.S.: 2FA might be secure, but it’s not usable: a summative usability assessment of google’s two-factor authentication (2FA) methods. Hum. Fact. Ergon. Soc. Ann. Meet. 62(1), 1141–1145 (2018)
Metadaten
Titel
Easy Identity Management and Enhanced Security in Account Linking
verfasst von
Dahey Yoo
Jin Ra
Bora Kang
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-51828-8_25

Neuer Inhalt