Skip to main content

2018 | OriginalPaper | Buchkapitel

Towards Privacy-Aware Keyboards

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As shown by various studies, the dynamics of typing on a keyboard is characteristic to persons. On the one hand, this may allow for person identification based on keystroke dynamics in various applications. On the other hand, in certain situations, such as chat-based anonymous helplines, web search for sensitive topics, etc., users may not want to reveal their identity. In general, there are various methods to increase the protection of personal data. In this paper, we propose the concept of privacy-aware keyboard, i.e., a keyboard which transmits keyboard events (such as pressing or releasing of a key) with small random delays in order to ensure that the identity of the user is difficult to be inferred from her typing dynamics. We use real-world keystroke dynamics data in order to simulate privacy-aware keyboards with uniformly random delay and Gaussian delay. The experimental results indicate that the proposed techniques may have an important contribution to keeping the anonymity of users.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The number of typing sessions was approximately the same for each user. Despite the fact that the data is balanced, the recognition of the user based on typing dynamics could lead to an imbalanced classification task, for example in case if binary classifiers are used according to the one-vs-rest schema.
 
3
With random guessing we mean a naive classifier that works as follows: for each typing pattern x of the test data, is selects one of the users randomly (each user has an equal probability to be selected), and this randomly selected user, denoted as \(y_x^{(rnd)}\), is the prediction of the classifier. That is: according to the “guess” of this naive classifier, the typing pattern x belongs to the randomly selected user \(y_x^{(rnd)}\). As there are 12 users in our dataset, with a probability of 1 / 12 the randomly selected user will match the true user associated with the typing pattern, therefore, the accuracy of random guessing is 1 / 12.
 
Literatur
1.
Zurück zum Zitat Antal, M., Szabó, L.Z., László, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015)CrossRef Antal, M., Szabó, L.Z., László, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015)CrossRef
2.
Zurück zum Zitat Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)CrossRef Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)CrossRef
3.
Zurück zum Zitat Doroz, R., Porwik, P., Safaverdi, H.: The new multilayer ensemble classifier for verifying users based on keystroke dynamics. In: Núñez, M., Nguyen, N.T., Camacho, D., Trawiński, B. (eds.) ICCCI 2015. LNCS (LNAI), vol. 9330, pp. 598–605. Springer, Cham (2015). doi:10.1007/978-3-319-24306-1_58 CrossRef Doroz, R., Porwik, P., Safaverdi, H.: The new multilayer ensemble classifier for verifying users based on keystroke dynamics. In: Núñez, M., Nguyen, N.T., Camacho, D., Trawiński, B. (eds.) ICCCI 2015. LNCS (LNAI), vol. 9330, pp. 598–605. Springer, Cham (2015). doi:10.​1007/​978-3-319-24306-1_​58 CrossRef
4.
Zurück zum Zitat Buza, K., Neubrandt, D.: How you type is who you are. In: 11th IEEE International Symposium on Applied Computational Intelligence and Informatics, pp. 453–456 (2016) Buza, K., Neubrandt, D.: How you type is who you are. In: 11th IEEE International Symposium on Applied Computational Intelligence and Informatics, pp. 453–456 (2016)
5.
Zurück zum Zitat Kozierkiewicz-Hetmanska, A., Marciniak, A., Pietranik, M.: Data evolution method in the procedure of user authentication using keystroke dynamics. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawiński, B. (eds.) ICCCI 2016. LNCS (LNAI), vol. 9875, pp. 379–387. Springer, Cham (2016). doi:10.1007/978-3-319-45243-2_35 CrossRef Kozierkiewicz-Hetmanska, A., Marciniak, A., Pietranik, M.: Data evolution method in the procedure of user authentication using keystroke dynamics. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawiński, B. (eds.) ICCCI 2016. LNCS (LNAI), vol. 9875, pp. 379–387. Springer, Cham (2016). doi:10.​1007/​978-3-319-45243-2_​35 CrossRef
6.
Zurück zum Zitat Korolova, A., Kenthapadi, K., Mishra, N., Ntoulas, A.: Releasing search queries and clicks privately. In: Proceedings of the 18th International Conference on World Wide Web, pp. 171–180 (2009) Korolova, A., Kenthapadi, K., Mishra, N., Ntoulas, A.: Releasing search queries and clicks privately. In: Proceedings of the 18th International Conference on World Wide Web, pp. 171–180 (2009)
7.
Zurück zum Zitat Wong, F., Supian, A.S.M., Ismail, A.F., Kin, L.W., Soon, O.C.: Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm. In: 35th IEEE Asilomar Conference on Signals, Systems and Computers, vol. 2, pp. 911–915 (2001) Wong, F., Supian, A.S.M., Ismail, A.F., Kin, L.W., Soon, O.C.: Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm. In: 35th IEEE Asilomar Conference on Signals, Systems and Computers, vol. 2, pp. 911–915 (2001)
8.
Zurück zum Zitat Nanopoulos, A., Alcock, R., Manolopoulos, Y.: Feature-based classification of time-series data. Int. J. Comput. Res. 10(3), 49–61 (2001) Nanopoulos, A., Alcock, R., Manolopoulos, Y.: Feature-based classification of time-series data. Int. J. Comput. Res. 10(3), 49–61 (2001)
9.
Zurück zum Zitat Kim, S., Smyth, P., Luther, S.: Modeling waveform shapes with random effects segmental hidden Markov models. In: Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, pp. 309–316 (2004) Kim, S., Smyth, P., Luther, S.: Modeling waveform shapes with random effects segmental hidden Markov models. In: Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, pp. 309–316 (2004)
10.
Zurück zum Zitat Wozniak, M., Jackowski, K.: Fusers based on classifier response and discriminant function – comparative study. In: Corchado, E., Abraham, A., Pedrycz, W. (eds.) HAIS 2008. LNCS (LNAI), vol. 5271, pp. 361–368. Springer, Heidelberg (2008). doi:10.1007/978-3-540-87656-4_45 CrossRef Wozniak, M., Jackowski, K.: Fusers based on classifier response and discriminant function – comparative study. In: Corchado, E., Abraham, A., Pedrycz, W. (eds.) HAIS 2008. LNCS (LNAI), vol. 5271, pp. 361–368. Springer, Heidelberg (2008). doi:10.​1007/​978-3-540-87656-4_​45 CrossRef
11.
Zurück zum Zitat Krawczyk, B., Minku, L.L., Gama, J., Stefanowski, J., Woźniak, M.: Ensemble learning for data stream analysis: a survey. Inf. Fusion 37, 132–156 (2017)CrossRef Krawczyk, B., Minku, L.L., Gama, J., Stefanowski, J., Woźniak, M.: Ensemble learning for data stream analysis: a survey. Inf. Fusion 37, 132–156 (2017)CrossRef
12.
Zurück zum Zitat Buza, K., Nanopoulos, A., Horváth, T., Schmidt-Thieme, L.: GRAMOFON: general model-selection framework based on networks. Neurocomputing 75(1), 163–170 (2012)CrossRef Buza, K., Nanopoulos, A., Horváth, T., Schmidt-Thieme, L.: GRAMOFON: general model-selection framework based on networks. Neurocomputing 75(1), 163–170 (2012)CrossRef
13.
Zurück zum Zitat Buza, K.: Fusion Methods for Time-Series Classification. Peter Lang Verlag (2011) Buza, K.: Fusion Methods for Time-Series Classification. Peter Lang Verlag (2011)
14.
Zurück zum Zitat Krawczyk, B.: Learning from imbalanced data: open challenges and future directions. Prog. Artif. Intell. 5(4), 221–232 (2016)CrossRef Krawczyk, B.: Learning from imbalanced data: open challenges and future directions. Prog. Artif. Intell. 5(4), 221–232 (2016)CrossRef
15.
Zurück zum Zitat Saez, J.A., Krawczyk, B., Wozniak, M.: Analyzing the oversampling of different classes and types of examples in multi-class imbalanced datasets. Pattern Recogn. 57, 164–178 (2016)CrossRef Saez, J.A., Krawczyk, B., Wozniak, M.: Analyzing the oversampling of different classes and types of examples in multi-class imbalanced datasets. Pattern Recogn. 57, 164–178 (2016)CrossRef
16.
Zurück zum Zitat Ramírez-Gallego, S., Krawczyk, B., García, S., Woźniak, M., Herrera, F.: A survey on data preprocessing for data stream mining: current status and future directions. Neurocomputing 239, 39–57 (2017) Ramírez-Gallego, S., Krawczyk, B., García, S., Woźniak, M., Herrera, F.: A survey on data preprocessing for data stream mining: current status and future directions. Neurocomputing 239, 39–57 (2017)
17.
Zurück zum Zitat Xi, X., Keogh, E., Shelton, C., Wei, L., Ratanamahatana, C.A.: Fast time series classification using numerosity reduction. In: Proceedings of the 23rd ACM International Conference on Machine Learning, pp. 1033–1040 (2006) Xi, X., Keogh, E., Shelton, C., Wei, L., Ratanamahatana, C.A.: Fast time series classification using numerosity reduction. In: Proceedings of the 23rd ACM International Conference on Machine Learning, pp. 1033–1040 (2006)
18.
Zurück zum Zitat Ding, H., Trajcevski, G., Scheuermann, P., Wang, X., Keogh, E.: Querying and mining of time series data: experimental comparison of representations and distance measures. Proc. VLDB Endowment 1(2), 1542–1552 (2008)CrossRef Ding, H., Trajcevski, G., Scheuermann, P., Wang, X., Keogh, E.: Querying and mining of time series data: experimental comparison of representations and distance measures. Proc. VLDB Endowment 1(2), 1542–1552 (2008)CrossRef
19.
Zurück zum Zitat Chen, G.H., Nikolov, S., Shah, D.: A latent source model for nonparametric time series classification. Adv. Neural Inf. Proc. Syst. 26, 1088–1096 (2013) Chen, G.H., Nikolov, S., Shah, D.: A latent source model for nonparametric time series classification. Adv. Neural Inf. Proc. Syst. 26, 1088–1096 (2013)
20.
Zurück zum Zitat Devroye, L., Györfi, L., Lugosi, G.: A Probabilistic Theory of Pattern Recognition. Springer, New York (1996) Devroye, L., Györfi, L., Lugosi, G.: A Probabilistic Theory of Pattern Recognition. Springer, New York (1996)
Metadaten
Titel
Towards Privacy-Aware Keyboards
verfasst von
Krisztian Buza
Piroska B. Kis
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-59162-9_15