Please use this identifier to cite or link to this item:
|Title:||Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication||Authors:||Papadamou, Kostantinos
|Major Field of Science:||Engineering and Technology||Field Category:||Electrical Engineering - Electronic Engineering - Information Engineering||Keywords:||Computer Science;Cryptography and Security;Computer Science - Networking and Internet Architecture||Issue Date:||2020||Source:||IEEE Transactions on Information Forensics and Security, 2020, vol. 15, pp. 2183 - 2193||Volume:||15||Start page:||2183||End page:||2193||Project:||From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control||Journal:||IEEE Transactions on Information Forensics and Security||Abstract:||Current authentication methods on the Web have serious weaknesses. First, services heavily rely on the traditional password paradigm, which diminishes the end-users' security and usability. Second, the lack of attribute-based authentication does not allow anonymity-preserving access to services. Third, users have multiple online accounts that often reflect distinct identity aspects. This makes proving combinations of identity attributes hard on the users. In this paper, we address these weaknesses by proposing a privacy-preserving architecture for device-centric and attribute-based authentication based on: 1) the seamless integration between usable/strong device-centric authentication methods and federated login solutions; 2) the separation of the concerns for Authorization, Authentication, Behavioral Authentication and Identification to facilitate incremental deployability, wide adoption and compliance with NIST assurance levels; and 3) a novel centralized component that allows end-users to perform identity profile and consent management, to prove combinations of fragmented identity aspects, and to perform account recovery in case of device loss. To the best of our knowledge, this is the first effort towards fusing the aforementioned techniques under an integrated architecture. This architecture effectively deems the password paradigm obsolete with minimal modification on the service provider's software stack.||ISSN:||1556-6013||DOI:||10.1109/TIFS.2019.2958763||Rights:||© IEEE||Type:||Article||Affiliation :||Cyprus University of Technology
Research & Development, CERTSIGN S.A
University of Rome Tor Vergata
|Appears in Collections:||Άρθρα/Articles|
checked on Nov 27, 2020
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.