Privacy Aura for Transparent Authentication on Multiple Smart Devices

Nowadays, users carry multiple connected devices such as a smartphone, laptop, connected watch. . . . Security constraints limit user’s usability especially when using all of them intensively during the day (social media, work). In this paper, we propose the privacy Aura concept corresponding to the circle of trust in the neighborhood of each smart device to facilitate user authentication. Many data (phone calls habits, biometrics, localization) can be collected to realize a transparent and privacy compliant authentication on each device. The confidence on user authentication on each device can be transferred to another one if it is located in the same Aura. This is the main contribution of the paper. We show through illustrations the benefit of the proposed

[1]  Chuan Qin,et al.  Progressive Authentication: Deciding When to Authenticate on Mobile Phones , 2012, USENIX Security Symposium.

[2]  Rama Chellappa,et al.  Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.

[3]  Steven Furnell,et al.  Authentication Aura - A Distributed Approach to User Authentication , 2011 .

[4]  Weitao Xu Mobile Applications Based on Smart Wearable Devices , 2015, SenSys.

[5]  Christophe Rosenberger,et al.  When my Behavior Enhances my Smartphone Security , 2020, 2020 International Conference on Cyberworlds (CW).

[6]  Qian Zhang,et al.  Proximity based IoT device authentication , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[7]  ByungRae Cha,et al.  Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices , 2015 .

[8]  Petr Dzurenda,et al.  Multi-Device Authentication using Wearables and IoT , 2016, SECRYPT.

[9]  Christophe Rosenberger,et al.  Evaluation of Biometric Template Protection Schemes based on a Transformation , 2018, ICISSP.

[10]  Christoph Busch,et al.  On application of bloom filters to iris biometrics , 2014, IET Biom..

[11]  José María de Fuentes,et al.  Access Control for the Cloud Based on Multi-device Authentication , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[12]  Rama Chellappa,et al.  Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[13]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[14]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..