skip to main content
10.1145/1866835.1866837acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Authentication in the clouds: a framework and its application to mobile users

Published:08 October 2010Publication History

ABSTRACT

Cloud computing is a natural fit for mobile security. Typical handsets have input constraints and practical computational and power limitations, which must be respected by mobile security technologies in order to be effective. We describe how cloud computing can address these issues. Our approach is based on a flexible framework for supporting authentication decisions we call TrustCube (to manage the authentication infrastructure) and on a behavioral authentication approach referred to as implicit authentication (to translate user behavior into authentication scores). The combination results in a new authentication paradigm for users of mobile technologies, one where an appropriate balance between usability and trust can be managed through flexible policies and dynamic tuning.

References

  1. }}Amazon Elastic Compute Cloud (Amazon EC2). On the Web at http://aws.amazon.com/ec2/.Google ScholarGoogle Scholar
  2. }}Android. On the Web at http://www.android.com/.Google ScholarGoogle Scholar
  3. }}Entrust IdentityGuard. On the Web at http://www.entrust.com/strong-authentication/identityguard/index.htm.Google ScholarGoogle Scholar
  4. }}Google App Engine. On the Web at http://code.google.com/appengine.Google ScholarGoogle Scholar
  5. }}List of countries by number of mobile phones in use. On the Web at http://en.wikipedia.org/wiki/List_of_ countries_by_number_of_mobile_phones_in_use.Google ScholarGoogle Scholar
  6. }}OpenID. On the Web at http://openid.net.Google ScholarGoogle Scholar
  7. }}RSA Adaptive Authentication. On the Web at http://www.rsa.com/node.aspx?id=3018.Google ScholarGoogle Scholar
  8. }}SecurID. On the Web at http://en.wikipedia.org/wiki/SecurID.Google ScholarGoogle Scholar
  9. }}The 41st Parameter. On the Web at http://www.the41st.com/.Google ScholarGoogle Scholar
  10. }}Trusted Computing Group. On the Web at http://www.trustedcomputinggroup.org/.Google ScholarGoogle Scholar
  11. }}Trusted Network Connect. On the Web at http://www.trustedcomputinggroup.org/ developers/trusted_network_connect/.Google ScholarGoogle Scholar
  12. }}R. Greenstadt and J. Beal. Cognitive security for personal devices. In The First ACM Workshop on AISec, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. }}M. Jakobsson, E. Shi, P. Golle, and R. Chow. Implicit Authentication for Mobile Devices. In HotSec '09: Proceedings of the 4th USENIX Workshop on Hot Topics in Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}A. Juels, M. Jakobsson, and T. N. Jagatic. Cache cookies for browser authentication. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}Y. Niu, E. Shi, R. Chow, P. Golle, and M. Jakobsson. One experience collecting sensitive mobile data. In USER Workshop of SOUPS, 2010.Google ScholarGoogle Scholar
  16. }}J. Oberheide, E. Cooke, and F. Jahanian. CloudAV: N-Version Antivirus in the Network Cloud. In Proceedings of the 17th USENIX Security Symposium (Security), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. }}E. Shi, Y. Niu, M. Jakobsson, and R. Chow. Implicit authentication through learning user behavior. In Information Security Conference (ISC), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. }}Z. Song, J. Molina, S. Lee, H. Lee, S. Kotani, and R. Masuoka. Trustcube: An infrastructure that builds trust in client. In Future of Trust in Computing, Proceedings of the First International Conference, 2009.Google ScholarGoogle Scholar

Index Terms

  1. Authentication in the clouds: a framework and its application to mobile users

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCSW '10: Proceedings of the 2010 ACM workshop on Cloud computing security workshop
      October 2010
      118 pages
      ISBN:9781450300896
      DOI:10.1145/1866835

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 October 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate37of108submissions,34%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader