Skip to main content
Erschienen in: Information Systems Frontiers 5/2015

01.10.2015

Secure and privacy preserving data processing support for active authentication

verfasst von: Yan Sun, Shambhu Upadhyaya

Erschienen in: Information Systems Frontiers | Ausgabe 5/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Keystroke dynamics and mouse movements are effective behavioral biometric modalities for active authentication. However, very little is done on the privacy of collection and transmission of keyboard and mouse data. In this paper, we develop a rule based data sanitization scheme to detect and remove personally identifiable and other sensitive information from the collected data set. Preliminary experiments show that our scheme incurs on average 5.69 % false negative error rate and 0.64 % false positive error rate. We also develop a data transmission scheme using the Extensible Messaging and Presence Protocol (XMPP) to guarantee privacy during transmission. Using these two schemes as a basis, we develop two distinct architectures for providing secure and privacy preserving data processing support for active authentication. These architectures provide flexibility of use depending upon the application environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ahmed, A., & Traore, I. (2005). Anomaly Intrusion Detection based on Biometrics. In Proceedings of the 2005 I.E. Workshop on Information Assurance. West Point. Ahmed, A., & Traore, I. (2005). Anomaly Intrusion Detection based on Biometrics. In Proceedings of the 2005 I.E. Workshop on Information Assurance. West Point.
Zurück zum Zitat Ahmed, W., & Athreya, J. (2013). Data Masking Best Practices. An Oracle White Paper (June 2013). Ahmed, W., & Athreya, J. (2013). Data Masking Best Practices. An Oracle White Paper (June 2013).
Zurück zum Zitat Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. ACM Transactions on Information and System Security, 5, 367–397.CrossRef Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. ACM Transactions on Information and System Security, 5, 367–397.CrossRef
Zurück zum Zitat Garg, A., Rahalkar, R., Upadhyaya, S., & Kwiat, K. (2006). Profiling Users in GUI Based Systems for Masquerade Detection. In Proceedings of 7th Annual IEEE Information Assurance Workshop (IAW 2006). United States Military Academy, West Point. Garg, A., Rahalkar, R., Upadhyaya, S., & Kwiat, K. (2006). Profiling Users in GUI Based Systems for Masquerade Detection. In Proceedings of 7th Annual IEEE Information Assurance Workshop (IAW 2006). United States Military Academy, West Point.
Zurück zum Zitat Goecks, J., & Shavlik, J. (1999). Automatically Labeling Web Pages Based on Normal User Actions. In IJCAI Workshop on Machine Learning for Information Filtering. Stockholm. Goecks, J., & Shavlik, J. (1999). Automatically Labeling Web Pages Based on Normal User Actions. In IJCAI Workshop on Machine Learning for Information Filtering. Stockholm.
Zurück zum Zitat Gunetti, D., & Picardi, C. (2005). Keystroke analysis of free text. ACM Transactions on Information and System Security (ACM TISSEC), 8(3), 312–347.CrossRef Gunetti, D., & Picardi, C. (2005). Keystroke analysis of free text. ACM Transactions on Information and System Security (ACM TISSEC), 8(3), 312–347.CrossRef
Zurück zum Zitat Gupta, A., Asthana, A., & Gupta, N. (2008). Masquerade Detection using Typing Pattern. In Proceedings of 2nd National Conference on Challenges and Opportunities in Information Technology (COIT-2008). Mandi Gobindgarh. Gupta, A., Asthana, A., & Gupta, N. (2008). Masquerade Detection using Typing Pattern. In Proceedings of 2nd National Conference on Challenges and Opportunities in Information Technology (COIT-2008). Mandi Gobindgarh.
Zurück zum Zitat Johansson, L. (2005). XMPP as MOM. Greater NOrdic Middleware Symposium (GNOMIS). Oslo: University of Stockholm. Johansson, L. (2005). XMPP as MOM. Greater NOrdic Middleware Symposium (GNOMIS). Oslo: University of Stockholm.
Zurück zum Zitat Leggett, J., Williams, G., Usnick, M., & Longnecker, M. (1991). Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 35.6(1991), 859–870.CrossRef Leggett, J., Williams, G., Usnick, M., & Longnecker, M. (1991). Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 35.6(1991), 859–870.CrossRef
Zurück zum Zitat Monrose, F., & Rubin, A. (1997). Authentication via Keystroke Dynamics. In ACM Conference on Computer and Communications Security. Zurich, pages 48–56. Monrose, F., & Rubin, A. (1997). Authentication via Keystroke Dynamics. In ACM Conference on Computer and Communications Security. Zurich, pages 48–56.
Zurück zum Zitat Pusara, M., & Brodley, C. E. (2004). User re-authentication via mouse movements. In VizSEC/DMSEC’04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. Washington DC, pages 1–8. Pusara, M., & Brodley, C. E. (2004). User re-authentication via mouse movements. In VizSEC/DMSEC04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. Washington DC, pages 1–8.
Zurück zum Zitat Radhakrishnan, R., Kharrazi, M., & Memon, N. (2005). Data masking: a new approach for steganography? The Journal of VLSI Signal Processing, 41(3), 293–303.CrossRef Radhakrishnan, R., Kharrazi, M., & Memon, N. (2005). Data masking: a new approach for steganography? The Journal of VLSI Signal Processing, 41(3), 293–303.CrossRef
Zurück zum Zitat Ravikumar, G. K., Manjunath, T. N., Ravindra, S., & Umesh, I. M. (2011). A survey on recent trends, process and development in data masking for testing. IJCSI, 534. Ravikumar, G. K., Manjunath, T. N., Ravindra, S., & Umesh, I. M. (2011). A survey on recent trends, process and development in data masking for testing. IJCSI, 534.
Zurück zum Zitat Shavlik, J., Shavlik, M., & Fahland, M. (2001). Evaluating Software Sensors for Actively Profiling Windows 2000 Computer Users. In Fourth International Symposium on Recent Advances in Intrusion Detection. Davis. Shavlik, J., Shavlik, M., & Fahland, M. (2001). Evaluating Software Sensors for Actively Profiling Windows 2000 Computer Users. In Fourth International Symposium on Recent Advances in Intrusion Detection. Davis.
Metadaten
Titel
Secure and privacy preserving data processing support for active authentication
verfasst von
Yan Sun
Shambhu Upadhyaya
Publikationsdatum
01.10.2015
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 5/2015
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-015-9587-9

Weitere Artikel der Ausgabe 5/2015

Information Systems Frontiers 5/2015 Zur Ausgabe