Enhancing the Privacy and Computability of Location-Sensitive Data for Context Authentication

04/18/2019
by   Pradip Mainali, et al.
0

This paper proposes a new privacy-enhancing, context-aware user authentication system, ConSec, which uses a transformation of general location-sensitive data, such as GPS location, barometric altitude and noise levels, collected from the user's device, into a representation based on Locality-Sensitive-Hashing (LSH). This enables numerical computation on the hashed data, which is used by a machine learning classifier to model user behaviour for authentication. We present how ConSec supports learning from categorical as well as numerical data, while addressing a multitude of on-device and network-based threats. ConSec is implemented for the Android platform and an extensive evaluation is presented using data collected in the field from 35 users. Experimental results are promising, with a small equal error rate of 2.5 privacy analysis of the proposed scheme before, lastly, concluding with some future areas of research.

READ FULL TEXT
research
08/21/2019

Differentiated context-aware hook placement for different owners' smartphones

A hook is a piece of code. It checks user privacy policy before some sen...
research
01/21/2020

Resilient Collaborative Privacy for Location-Based Services

Location-based Services (LBSs) provide valuable services, with convenien...
research
10/22/2017

WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices

The growing trend of using wearable devices for context-aware computing ...
research
08/02/2018

The Privacy Exposure Problem in Mobile Location-based Services

Mobile location-based services (LBSs) empowered by mobile crowdsourcing ...
research
08/26/2023

Location Privacy and Spectrum Efficiency Enhancement in Spectrum Sharing Systems

In this work, we investigate the benefits of secondary user (SU) network...
research
09/17/2020

Location-based Behavioral Authentication Using GPS Distance Coherence

Most of the current user authentication systems are based on PIN code, p...
research
11/10/2022

Warmup and Transfer Knowledge-Based Federated Learning Approach for IoT Continuous Authentication

Continuous behavioural authentication methods add a unique layer of secu...

Please sign up or login with your details

Forgot password? Click here to reset