Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review
نویسندگان
چکیده
منابع مشابه
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
We propose a privacy preserving biometrics-based authentication protocol by which users can authenticate to different service providers from their own devices without involving identity providers in the transactions. Authentication is performed through a zero-knowledge proof of knowledge protocol which is based on a cryptographic identity token created using the unique, repeatable and revocable...
متن کاملPassBio: Privacy-Preserving User-Centric Biometric Authentication
The proliferation of online biometric authentication has necessitated security requirements of biometric templates. The existing secure biometric authentication schemes feature a server-centric model, where a service provider maintains a biometric database and is fully responsible for the security of the templates. The end-users have to fully trust the server in storing, processing and managing...
متن کاملSecure and Privacy-Preserving User Authentication Using Biometrics
Identity management lies in the field of Information Security, presenting numerous attractive research categories. Biometrics have been established as a new approach to mitigate the limitations and weaknesses of traditional access methods of passwords and tokens. However, biometrics introduce new security and privacy risks since they cannot be easily revoked. Due to the noisy nature of biometri...
متن کاملSensor-Based User Authentication
We study the feasibility of leveraging the sensors embedded on mobile devices to enable a user authentication mechanism that is easy for users to perform, but hard for attackers to bypass. The proposed approach lies on the fact that users perform gestures in a unique way that depends on how they hold the phone, and on their hand’s geometry, size, and flexibility. Based on this observation, we i...
متن کاملPrivacy-Preserving Speaker Authentication
Speaker authentication systems require access to the voice of the user. A person’s voice carries information about their gender, nationality etc., all of which become accessible to the system, which could abuse this knowledge. The system also stores users’ voice prints – these may be stolen and used to impersonate the users elsewhere. It is therefore important to develop privacy preserving voic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2020
ISSN: 1424-8220
DOI: 10.3390/s21010092