Skip to main content
Top
Published in: Information Systems Frontiers 5/2015

01-10-2015

Secure and privacy preserving data processing support for active authentication

Authors: Yan Sun, Shambhu Upadhyaya

Published in: Information Systems Frontiers | Issue 5/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Keystroke dynamics and mouse movements are effective behavioral biometric modalities for active authentication. However, very little is done on the privacy of collection and transmission of keyboard and mouse data. In this paper, we develop a rule based data sanitization scheme to detect and remove personally identifiable and other sensitive information from the collected data set. Preliminary experiments show that our scheme incurs on average 5.69 % false negative error rate and 0.64 % false positive error rate. We also develop a data transmission scheme using the Extensible Messaging and Presence Protocol (XMPP) to guarantee privacy during transmission. Using these two schemes as a basis, we develop two distinct architectures for providing secure and privacy preserving data processing support for active authentication. These architectures provide flexibility of use depending upon the application environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Ahmed, A., & Traore, I. (2005). Anomaly Intrusion Detection based on Biometrics. In Proceedings of the 2005 I.E. Workshop on Information Assurance. West Point. Ahmed, A., & Traore, I. (2005). Anomaly Intrusion Detection based on Biometrics. In Proceedings of the 2005 I.E. Workshop on Information Assurance. West Point.
go back to reference Ahmed, W., & Athreya, J. (2013). Data Masking Best Practices. An Oracle White Paper (June 2013). Ahmed, W., & Athreya, J. (2013). Data Masking Best Practices. An Oracle White Paper (June 2013).
go back to reference Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. ACM Transactions on Information and System Security, 5, 367–397.CrossRef Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. ACM Transactions on Information and System Security, 5, 367–397.CrossRef
go back to reference Garg, A., Rahalkar, R., Upadhyaya, S., & Kwiat, K. (2006). Profiling Users in GUI Based Systems for Masquerade Detection. In Proceedings of 7th Annual IEEE Information Assurance Workshop (IAW 2006). United States Military Academy, West Point. Garg, A., Rahalkar, R., Upadhyaya, S., & Kwiat, K. (2006). Profiling Users in GUI Based Systems for Masquerade Detection. In Proceedings of 7th Annual IEEE Information Assurance Workshop (IAW 2006). United States Military Academy, West Point.
go back to reference Goecks, J., & Shavlik, J. (1999). Automatically Labeling Web Pages Based on Normal User Actions. In IJCAI Workshop on Machine Learning for Information Filtering. Stockholm. Goecks, J., & Shavlik, J. (1999). Automatically Labeling Web Pages Based on Normal User Actions. In IJCAI Workshop on Machine Learning for Information Filtering. Stockholm.
go back to reference Gunetti, D., & Picardi, C. (2005). Keystroke analysis of free text. ACM Transactions on Information and System Security (ACM TISSEC), 8(3), 312–347.CrossRef Gunetti, D., & Picardi, C. (2005). Keystroke analysis of free text. ACM Transactions on Information and System Security (ACM TISSEC), 8(3), 312–347.CrossRef
go back to reference Gupta, A., Asthana, A., & Gupta, N. (2008). Masquerade Detection using Typing Pattern. In Proceedings of 2nd National Conference on Challenges and Opportunities in Information Technology (COIT-2008). Mandi Gobindgarh. Gupta, A., Asthana, A., & Gupta, N. (2008). Masquerade Detection using Typing Pattern. In Proceedings of 2nd National Conference on Challenges and Opportunities in Information Technology (COIT-2008). Mandi Gobindgarh.
go back to reference Johansson, L. (2005). XMPP as MOM. Greater NOrdic Middleware Symposium (GNOMIS). Oslo: University of Stockholm. Johansson, L. (2005). XMPP as MOM. Greater NOrdic Middleware Symposium (GNOMIS). Oslo: University of Stockholm.
go back to reference Leggett, J., Williams, G., Usnick, M., & Longnecker, M. (1991). Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 35.6(1991), 859–870.CrossRef Leggett, J., Williams, G., Usnick, M., & Longnecker, M. (1991). Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 35.6(1991), 859–870.CrossRef
go back to reference Monrose, F., & Rubin, A. (1997). Authentication via Keystroke Dynamics. In ACM Conference on Computer and Communications Security. Zurich, pages 48–56. Monrose, F., & Rubin, A. (1997). Authentication via Keystroke Dynamics. In ACM Conference on Computer and Communications Security. Zurich, pages 48–56.
go back to reference Pusara, M., & Brodley, C. E. (2004). User re-authentication via mouse movements. In VizSEC/DMSEC’04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. Washington DC, pages 1–8. Pusara, M., & Brodley, C. E. (2004). User re-authentication via mouse movements. In VizSEC/DMSEC04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. Washington DC, pages 1–8.
go back to reference Radhakrishnan, R., Kharrazi, M., & Memon, N. (2005). Data masking: a new approach for steganography? The Journal of VLSI Signal Processing, 41(3), 293–303.CrossRef Radhakrishnan, R., Kharrazi, M., & Memon, N. (2005). Data masking: a new approach for steganography? The Journal of VLSI Signal Processing, 41(3), 293–303.CrossRef
go back to reference Ravikumar, G. K., Manjunath, T. N., Ravindra, S., & Umesh, I. M. (2011). A survey on recent trends, process and development in data masking for testing. IJCSI, 534. Ravikumar, G. K., Manjunath, T. N., Ravindra, S., & Umesh, I. M. (2011). A survey on recent trends, process and development in data masking for testing. IJCSI, 534.
go back to reference Shavlik, J., Shavlik, M., & Fahland, M. (2001). Evaluating Software Sensors for Actively Profiling Windows 2000 Computer Users. In Fourth International Symposium on Recent Advances in Intrusion Detection. Davis. Shavlik, J., Shavlik, M., & Fahland, M. (2001). Evaluating Software Sensors for Actively Profiling Windows 2000 Computer Users. In Fourth International Symposium on Recent Advances in Intrusion Detection. Davis.
Metadata
Title
Secure and privacy preserving data processing support for active authentication
Authors
Yan Sun
Shambhu Upadhyaya
Publication date
01-10-2015
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 5/2015
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-015-9587-9

Other articles of this Issue 5/2015

Information Systems Frontiers 5/2015 Go to the issue

Premium Partner