Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3465481.3470473acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Template Protected Authentication based on Location History and b-Bit MinHash

Published: 17 August 2021 Publication History
  • Get Citation Alerts
  • Abstract

    Various services ranging from finance to public services are digitalized in recent years for higher efficiency and user convenience. With this service digitalization, the need for identifying and authenticating users is increasing. Amongst the user authentication methods, biometric authentication is spreading as it does not require the user to remember a password or to have a specific token. As a more convenient authentication method, research is also being conducted on unconscious authentication using smartphones’ movement history. In this paper, we propose location history-based implicit user authentication acquired through GPS-equipped mobile devices. This method enables hands-free user authentication just by having a mobile device. However, location data are sensitive information that needs to be secured from the risk of location data leakage. By using the template protection technique, location data can be transformed so that the original location data cannot be recovered while enabling authentication. However, it has a trade-off between security and accuracy and remains as a problem to be solved. This paper proposes a new location history matching method based on Modified Weighted Jaccard Coefficient. Then it extends it to template protected location history authentication by presenting a new template protection technique using b-Bit MinHash. Our experimental results show that our proposed location matching method achieves practical accuracy compared with the conventional location history matching method. Furthermore, our template-protected location authentication has comparable accuracy to unprotected matching.

    References

    [1]
    2018. Information technology - Performance testing of biometric template protection schemes. In ISO/IEC 30136:2018. ISO/IEC JTC 1/SC 37 Biometrics. https://www.iso.org/standard/53256.html
    [2]
    Andrei Broder. 1997. On the resemblance and containment of documents. In Proceedings of the Compression and Complexity of Sequences(SEQUENCES ’97). IEEE.
    [3]
    Andrei Broder. 2000. Min-Wise Independent Permutations. Computer and System Sciences 60 (2000), 640–6591.
    [4]
    Johannes Buchmann. 2004. Introduction to Cryptography. Springer-Verlag, New York, NY. https://doi.org/10.1007/978-1-4419-9003-7
    [5]
    Ondřej Chum, James Philbin, and Andrew Zisserman. 2008. Near duplicate image detection: MinHash and tf-idf weighting. In Proceedings of the British Machine Vision Conference.
    [6]
    Dan Cvrcek, Marek Kumpost, Vashek Matyas, and George Danezis. 2006. A study on the value of location privacy. In Proceedings of the 5th ACM workshop on Privacy in electronic society(WPES ’06). ACM Press, 109?–118.
    [7]
    Lex Fridman, Steven Weber, Rachel Greenstadt, and Moshe Kam. 2016. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location. IEEE Systems 11, 2 (2016), 5131–521.
    [8]
    Piotr Indyk and Rajeev Motwani. 1998. Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality. In Proceedings of the thirtieth annual ACM symposium on Theory of Computing(STOC ’98). ACM Press, 604–613.
    [9]
    Sergey Ioffe. 2010. Improved Consistent Sampling. : Weighted Minhash and L1 Sketching. In Proceedings of the 10th International Conference on Data Mining(ICDM ’10). IEEE, 246–255.
    [10]
    Markus Jakobsson, Elaine Shi, and Richard Chow. 2009. Implicit Authentication for Mobile Devices. In Proceedings of the first USENIX conference on Hot topics in securit(HotSec ’09). USENIX Association, Berkley, CA.
    [11]
    Ryosuke Kobayashi, Hiroya Susuki, Nobuyuki Saji, and Rie Shigetomi Yamaguchi. 2018. Lifestyle authentication and MITHRA project. In Proceedings of the 10th International Conference on Communication System & Networks(COMSNETS ’18). IEEE, 464–467.
    [12]
    Ryosuke Kobayashi and Rie Shigetomi Yamaguchi. 2015. A behavior authentication method using wi-fi bssids around smartphone carried by a user. In Proceedings of the 3rd International Symposium on Computing and Networking(CANDAR ’15). IEEE, 463–469.
    [13]
    Ryosuke Kobayashi and Rie Shigetomi Yamaguchi. 2016. One hour term authentication for Wi-Fi information captured by smartphone sensorsr. In Information Theory and Its Applications(ISITA ’16). IEEE.
    [14]
    David Kosiur. 2015. Biometric Security. Cambridge Scholars Publishing.
    [15]
    Karthik Nandakumar and Anil K. Jain. 2015. Min-Wise Independent Permutations. IEEE Signal Processing Magazine 32, 5 (2015), 88–100.
    [16]
    Li Ping and Konig Arnd Christian. 2010. b-Bit Minwise Hashing. In Proceedings of the 9th Nineteenth International World Wide Web Conference(WWW ’10).
    [17]
    Weidong Shi, Jun Yang, and Yifei Jiang Feng Yang. 2011. SenGuard: Passive User Identi?cation on Smartphones Using Multiple Sensor. In Proceedings of the 7th International Conference on Wireless and Mobile Computing, Networking and Communications(WiMob ’11). IEEE.
    [18]
    Kenta Takahashi and Shinji Hirata. 2011. Cancelable biometrics with provable security and its application to fingerprint verification. IEICE Transactions 94, 1 (2011), 233–244.
    [19]
    Masayuki Yoshino, Ken Naganuma, and Hisayoshi Sato. 2011. Symmetric Searchable Encryption for Database Applications. In Proceedings of the 4th International Conference on Network-Based Information Systems.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
    August 2021
    1447 pages
    ISBN:9781450390514
    DOI:10.1145/3465481
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 August 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cancellable biometrics
    2. Location History
    3. MinHash User Authentication

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ARES 2021

    Acceptance Rates

    Overall Acceptance Rate 228 of 451 submissions, 51%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 70
      Total Downloads
    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media