Detailed Information on Publication Record
2016
Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones
GASTI, Paolo, Jaroslav ŠEDĚNKA, Qing YANG, Gang ZHOU, Kiran S BALAGANI et. al.Basic information
Original name
Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones
Authors
GASTI, Paolo (380 Italy), Jaroslav ŠEDĚNKA (203 Czech Republic, guarantor, belonging to the institution), Qing YANG (156 China), Gang ZHOU (156 China) and Kiran S BALAGANI (356 India)
Edition
IEEE Transactions on Information Forensics and Security, IEEE, 2016, 1556-6013
Other information
Language
English
Type of outcome
Článek v odborném periodiku
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
United States of America
Confidentiality degree
není předmětem státního či obchodního tajemství
Impact factor
Impact factor: 4.332
RIV identification code
RIV/00216224:14310/16:00094222
Organization unit
Faculty of Science
UT WoS
000386223800013
Keywords in English
Privacy; cryptographic protocols; authentication; energy efficiency
Tags
International impact, Reviewed
Změněno: 11/5/2017 15:01, Ing. Andrea Mikešková
Abstract
V originále
Common smartphone authentication mechanisms (e.g., PINs, graphical passwords, and fingerprint scans) are not designed to offer security post-login. Multi-modal continuous authentication addresses this issue by frequently and unobtrusively authenticating the user via behavioral biometric signals, such as touchscreen interaction and hand movements. Because smartphones can easily fall into the hands of the adversary, it is critical that the behavioral biometric information collected and processed on these devices is secured. This can be done by offloading encrypted template information to a remote server, and then performing authentication via privacy-preserving protocols. In this paper, we demonstrate that the energy overhead of current privacy-preserving protocols for continuous authentication is unsustainable on smartphones. To reduce energy consumption, we design a technique that leverages characteristics unique to the authentication setting in order to securely outsource computation to an untrusted Cloud. Our approach is secure against a colluding smartphone and Cloud, thus making it well suited for authentication. We performed extensive experimental evaluation. With our technique, the energy requirement for running an authentication instance that computes Manhattan distance is 0.2 mWh, which corresponds to a negligible fraction of the smartphone's battery capacity. In addition, for Manhattan distance, our protocol runs in 0.72 and 2 s for 8 and 28 biometric features, respectively. We were also able to compute Hamming distance in 3.29 s, compared with 95.57 s achieved with the previous fastest outsourced computation protocol (Whitewash). These results demonstrate that ours is presently the only technique suitable for low-latency continuous authentication (e.g., with authentication scan windows of 60 s or shorter).