Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3267323.3268964acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem

Published: 15 January 2018 Publication History
  • Get Citation Alerts
  • Abstract

    This paper presents a novel research model of identity and the use of this model to answer some interesting research questions. Information travels in the cyber world, not only bringing us convenience and prosperity but also jeopardy. Protecting this information has been a commonly discussed issue in recent years. One type of this information is Personally Identifiable Information (PII), often used to perform personal authentication. People often give PIIs to organizations, e.g., when applying for a new job or filling out a new application on a website. While the use of such PII might be necessary for authentication, giving PII increases the risk of its exposure to criminals. We introduce two innovative approaches based on our model of identity to help evaluate and find an optimal set of PIIs that satisfy authentication purposes but minimize risk of exposure. Our model paves the way for more informed selection of PIIs by organizations that collect them as well as by users who offer PIIs to these organizations.

    References

    [1]
    L. Atzori, A. Iera, and G. Morabito. The internet of things: A survey. Computer Networks, 54(15):2787 -- 2805, 2010.
    [2]
    E. Bertino, F. Paci, and N. Shang. Keynote 2: Digital identity protection - concepts and issues. In 2009 International Conference on Availability, Reliability and Security, pages 69--78, March 2009.
    [3]
    Y. Cao and L. Yang. A survey of identity management technology. In 2010 IEEE International Conference on Information Theory and Information Security, pages 287--293, Dec 2010.
    [4]
    K. C. Chang, R. N. Zaeem, and K. S. Barber. Internet of things: Securing the identity by analyzing ecosystem models of devices and organizations. In 2018 Association for the Advancement of Artificial Intelligence Spring Symposium, March 2018. To Appear.
    [5]
    M. A. Jan, P. Nanda, X. He, Z. Tan, and R. P. Liu. A robust authentication scheme for observing resources in the internet of things environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pages 205--211, Sept 2014.
    [6]
    P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad. Identity establishment and capability based access control (iecac) scheme for internet of things. In The 15th International Symposium on Wireless Personal Multimedia Communications, pages 187--191, Sept 2012.
    [7]
    H. Ning, H. Liu, and L. T. Yang. Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Transactions on Parallel and Distributed Systems, 26(3):657--667, March 2015.
    [8]
    A. Pascual, K. Marchini, and S. Miller. 2018 identity fraud: Fraud enters a new era of complexity. Technical report, Retrieved from Javelin Strategy & Research: https://www.javelinstrategy.com/coverage-area/2018-identity-fraud-fraud-enters-new-era-complexity, 2018.
    [9]
    Center for Identity. Itap data, 2017. Unpublished raw data.
    [10]
    S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini. Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76:146 -- 164, 2015.
    [11]
    R. H.Weber. Internet of things: Privacy issues revisited. Computer Law & Security Review, 31(5):618 -- 627, 2015.
    [12]
    B. D. Weinberg, G. R. Milne, Y. G. Andonova, and F. M. Hajjat. Internet of things: Convenience vs. privacy and secrecy. Business Horizons, 58(6):615 -- 624, 2015. Special Issue: The Magic of Secrets.
    [13]
    R. N. Zaeem, S. Budalakoti, K. S. Barber, M. Rasheed, and C. Bajaj. Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes. In Security Technology (ICCST), 2016 IEEE International Carnahan Conference on, pages 1--8. IEEE, 2016.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WPES'18: Proceedings of the 2018 Workshop on Privacy in the Electronic Society
    October 2018
    190 pages
    ISBN:9781450359894
    DOI:10.1145/3267323
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 January 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. authentication
    2. identity
    3. internet of things
    4. privacy

    Qualifiers

    • Research-article

    Conference

    CCS '18
    Sponsor:

    Acceptance Rates

    WPES'18 Paper Acceptance Rate 11 of 25 submissions, 44%;
    Overall Acceptance Rate 106 of 355 submissions, 30%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Personalized Privacy Assistant: Identity Construction and Privacy in the Internet of ThingsEntropy10.3390/e2505071725:5(717)Online publication date: 26-Apr-2023
    • (2022)Edge-computing-driven Internet of Things: A SurveyACM Computing Surveys10.1145/355530855:8(1-41)Online publication date: 23-Dec-2022
    • (2021)IoT Security ArchitectureInternet of Things Security10.1007/978-981-16-1372-2_3(27-44)Online publication date: 26-Mar-2021
    • (2020)A Framework for Estimating Privacy Risk Scores of Mobile AppsInformation Security10.1007/978-3-030-62974-8_13(217-233)Online publication date: 25-Nov-2020
    • (2020)How Much Identity Management with Blockchain Would Have Saved Us? A Longitudinal Study of Identity TheftBusiness Information Systems Workshops10.1007/978-3-030-61146-0_13(158-168)Online publication date: 12-Nov-2020
    • (2019)Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach2019 17th International Conference on Privacy, Security and Trust (PST)10.1109/PST47121.2019.8949059(1-3)Online publication date: Aug-2019

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media