Privacy Considerations for Risk-Based Authentication Systems

01/04/2023
by   Stephan Wiefling, et al.
0

Risk-based authentication (RBA) extends authentication mechanisms to make them more robust against account takeover attacks, such as those using stolen passwords. RBA is recommended by NIST and NCSC to strengthen password-based authentication, and is already used by major online services. Also, users consider RBA to be more usable than two-factor authentication and just as secure. However, users currently obtain RBA's high security and usability benefits at the cost of exposing potentially sensitive personal data (e.g., IP address or browser information). This conflicts with user privacy and requires to consider user rights regarding the processing of personal data. We outline potential privacy challenges regarding different attacker models and propose improvements to balance privacy in RBA systems. To estimate the properties of the privacy-preserving RBA enhancements in practical environments, we evaluated a subset of them with long-term data from 780 users of a real-world online service. Our results show the potential to increase privacy in RBA solutions. However, it is limited to certain parameters that should guide RBA design to protect privacy. We outline research directions that need to be considered to achieve a widespread adoption of privacy preserving RBA with high user acceptance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/30/2022

Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service

Risk-based authentication (RBA) aims to protect users against attacks in...
research
01/03/2023

Recent Trends on Privacy-Preserving Technologies under Standardization at the IETF

End-users are concerned about protecting the privacy of their personal d...
research
03/22/2023

Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example

Online services have difficulties to replace passwords with more secure ...
research
12/08/2022

Vicious Classifiers: Data Reconstruction Attack at Inference Time

Privacy-preserving inference via edge or encrypted computing paradigms e...
research
02/17/2022

The Political Economy of Privacy Enhancing Technologies

PETs have increasingly become vital empowering tools in today's highly d...
research
09/14/2022

A Generic Privacy-Preserving Protocol For Keystroke Dynamics-Based Continuous Authentication

Continuous authentication utilizes automatic recognition of certain user...
research
05/26/2021

Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication

Threats to passwords are still very relevant due to attacks like phishin...

Please sign up or login with your details

Forgot password? Click here to reset