SPCAuth: Scalable and Privacy-Preserving Continuous Authentication for Web Applications

Author(s):  
David Monschein ◽  
Oliver P. Waldhorst
2021 ◽  
pp. 102168
Author(s):  
Pedro Miguel Sánchez Sánchez ◽  
Lorenzo Fernández Maimó ◽  
Alberto Huertas Celdrán ◽  
Gregorio Martínez Pérez

2020 ◽  
Vol 2020 ◽  
pp. 1-11 ◽  
Author(s):  
Taeyun Kim ◽  
Yongwoo Oh ◽  
Hyoungshick Kim

To help smartphone users protect their phone, fingerprint-based authentication systems (e.g., Apple’s Touch ID) have increasingly become popular in smartphones. In web applications, however, fingerprint-based authentication is still rarely used. One of the most serious concerns is the lack of technology for securely storing fingerprint data used for authentication. Because scanned fingerprint data are not exactly the same each time, the use of a traditional cryptographic hash function (e.g., SHA-256) is infeasible to protect raw fingerprint data. In this paper, we present an efficient privacy-preserving fingerprint authentication system using a fully homomorphic encryption scheme in which fingerprint data are always stored and processed in an encrypted form. We implement a fully working fingerprint authentication system with a fingerprint database (containing 4,000 samples) using the Fast Fully Homomorphic Encryption over the Torus (TFHE) library. The proposed system can perform the fingerprint matching process within about 166 seconds (±0.564 seconds) on average.


2021 ◽  
Vol 9 (2) ◽  
pp. 131-135
Author(s):  
G. Srinivas Reddy, Et. al.

As the usage of internet and web applications emerges faster, security and privacy of the data is the most challenging issue which we are facing, leading to the possibility of being easily damaged. Various conventional techniques are used for privacy preservation like condensation, randomization and tree structure etc., the limitations of the existing approaches are, they are not able to maintain proper balance between the data utility and privacy and it may have the problem with privacy violations. This paper presents an Additive Rotation Perturbation approach for Privacy Preserving Data Mining (PPDM). In this proposed work, various dataset from UCI Machine Learning Repository was collected and it is protected with a New Additive Rotational Perturbation Technique under Privacy Preserving Data Mining. Experimental result shows that the proposed algorithm’s strength is high for all the datasets and it is estimated using the DoV (Difference of Variance) method.


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5967
Author(s):  
Ahmed Fraz Baig ◽  
Sigurd Eskeland

Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and context-oriented characteristics. Since these are personal data being transmitted and are outside the control of the user, this approach causes privacy issues. Continuous authentication has security challenges concerning poor matching rates and susceptibility of replay attacks. The security issues are mainly poor matching rates and the problems of replay attacks. In this survey, we present an overview of continuous authentication and comprehensively discusses its different modes, and issues that these modes have related to security, privacy, and usability. A comparison of privacy-preserving approaches dealing with the privacy issues is provided, and lastly recommendations for secure, privacy-preserving, and user-friendly continuous authentication.


2020 ◽  
Vol 2020 (3) ◽  
pp. 243-263
Author(s):  
Piyush Kumar Sharma ◽  
Devashish Gosain ◽  
Himanshu Sagar ◽  
Chaitanya Kumar ◽  
Aneesh Dogra ◽  
...  

AbstractDecoy Routing (DR), a promising approach to censorship circumvention, uses routers (rather than end hosts) as proxy servers. Users of censored networks, who wish to use DR, send specially crafted packets, nominally addressed to an uncensored website. Once safely out of the censored network, the packets encounter a special router (the Decoy Router) which identifies them using a secret handshake, and proxies them to their true destination (a censored site). However, DR has implementation problems: it is infeasible to reprogram routers for the complex operations required. Existing DR solutions fall back on using commodity servers as a Decoy Router. But as servers are not efficient at routing, most web applications show poor performance when accessed over DR. A further concern is that the Decoy Router has to inspect all flows in order to identify the ones that need DR. This may itself be a breach of privacy for other users (who neither require DR nor want to be monitored). In this paper, we present a novel DR system, Siege- Breaker (SB), which solves the aforementioned problems using an SDN-based architecture. Previous proposals involve a single unit which performs all major operations (inspecting all flows, identifying the DR requests and proxying them). In contrast, SB distributes the tasks for DR among three independent modules. (1) The SDN controller identifies DR requests via a covert, privacy preserving scheme, and does not need to inspect all flows. (2) The reconfigurable SDN switch intercepts packets, and forwards them to a secret proxy efficiently. (3) The secret proxy server proxies the client’s traffic to the censored site. Our modular, lightweight design achieves performance comparable to direct TCP downloads, for both in-lab setups, and Internet based tests involving commercial SDN switches.


Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 92
Author(s):  
Luis Hernández-Álvarez ◽  
José María de Fuentes ◽  
Lorena González-Manzano ◽  
Luis Hernández Encinas

Ensuring the confidentiality of private data stored in our technological devices is a fundamental aspect for protecting our personal and professional information. Authentication procedures are among the main methods used to achieve this protection and, typically, are implemented only when accessing the device. Nevertheless, in many occasions it is necessary to carry out user authentication in a continuous manner to guarantee an allowed use of the device while protecting authentication data. In this work, we first review the state of the art of Continuous Authentication (CA), User Profiling (UP), and related biometric databases. Secondly, we summarize the privacy-preserving methods employed to protect the security of sensor-based data used to conduct user authentication, and some practical examples of their utilization. The analysis of the literature of these topics reveals the importance of sensor-based data to protect personal and professional information, as well as the need for exploring a combination of more biometric features with privacy-preserving approaches.


2018 ◽  
pp. 49-57
Author(s):  
N. A. Gluzman

In the modern educational space regarding the realities of the information society special importance is attached to issues related to the provision of a high level of informatization of education, which implies teachers’ mastering the necessary competencies and the ability to introduce e-learning resources into educational and training practice. Adobe Flash as one of the platforms for creating web applications and multimedia presentations enjoys greatest popularity with users including teachers. However, in connection with the announcement of discontinuing Adobe Flash support in 2020, the issue of choosing an analog to create web applications and presentations for use in teaching purposes is becoming particularly relevant. The article provides a comprehensive analysis of developing electronic educational resources by teachers using Adobe Flash and HTML5 for teaching math in primary school.


Author(s):  
Maragathavalli P. ◽  
Seshankkumar M. ◽  
Dhivakaran V. ◽  
Ravindran S.

Sign in / Sign up

Export Citation Format

Share Document