PRIVACY-BASED ADAPTIVE CONTEXT-AWARE AUTHENTICATION SYSTEM FOR PERSONAL MOBILE DEVICES

Authors

  • ZHAN LIU University of Applied Sciences and Arts Western Switzerland (HES-SO Valais-Wallis), Sierre, Switzerland
  • RICCARDO BONAZZI University of Applied Sciences and Arts Western Switzerland (HES-SO Valais-Wallis), Sierre, Switzerland
  • YVES PIGNEUR University of Lausanne, Lausanne, Switzerland

Keywords:

Adaptive Single Sign-On, Authentication Security, Ease of Use, Context-Aware, Privacy, Business Model

Abstract

Over the past decade, mobile devices such as smartphones have become increasingly common as a form of handheld computing platform. The use of mobile applications on these mobile devices is experiencing unprecedented rates of growth. However, when using mobile applications, users are often requested to give context information. Such requests have led to growing privacy concerns. This paper proposes the use of context-awareness to improve single sign-on (SSO) solutions so that mobile users can protect their private information. A privacy-based adaptive SSO (ASSO) may be able to increase users’ perceived ease of use of the system and give service providers the necessary authentication security for their applications. The study was based on data gathered from 168 participants as part of the Lausanne Data Collection Campaign. This was led by the Nokia research center in Switzerland and used Nokia N95 phones. The analysis of SVM showed our expectations to be correct. Consequently, a new business model for mobile platforms has been proposed to reinforce our claim that privacy-friendly value propositions are possible and can be used to obtain a competitive advantage.

 

Downloads

Download data is not yet available.

References

Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., and Steggles, P. Towards a better

understanding of context and context-awareness. Handheld and ubiquitous computing, Springer

(1999), 304–307.

Ackerman, M., Darrell, T., and Weitzner, D.J. Privacy in context. Human–Computer Interaction

, 2-4 (2001), 167–176.

Addo, A. The adoption of mobile phone: How has it changes us socially. Issues Bus. Manag. Econ

, 3 (2013), 47–60.

Al-Qirim, N. Context-Aware Mobile Business Model Discovery. Procedia Computer Science 10,

(2012), 1180–1187.

Anchan, D. and Pegah, M. Regaining single sign-on taming the beast. Proceedings of the 31st

annual ACM SIGUCCS fall conference on User services, ACM (2003), 166–171.

Becker, A., Mladenowa, A., Kryvinska, N., and Strauss, C. Evolving taxonomy of business

models for mobile service delivery platform. Procedia Computer Science 10, (2012), 650–657.

Belanger, F., Hiller, J.S., and Smith, W.J. Trustworthiness in electronic commerce: the role of

privacy, security, and site attributes. The Journal of Strategic Information Systems 11, 3 (2002),

–270.

Beresford, A.R. and Stajano, F. Location privacy in pervasive computing. IEEE Pervasive

computing 2, 1 (2003), 46–55.

Biegel, G. and Cahill, V. A framework for developing mobile, context-aware applications.

Proceedings of the Second IEEE Annual Conference on Pervasive Computing and

Communications, Percom 2004, IEEE (2004), 361–365.

Bolton, R.J. and Hand, D.J. Statistical fraud detection: A review. Statistical science 17, 3 (2002),

–249.

Bouwman, H., Zhengjia, M., Van der Duin, P., and Limonard, S. A business model for IPTV

service: a dynamic framework. info 10, 3 (2008), 22–38.

Chen, G., Kotz, D., and others. A survey of context-aware mobile computing research. Technical

Report TR2000-381, Dept. of Computer Science, Dartmouth College, Hanover, NH, USA, 2000.

Cortes, C. and Vapnik, V. Support-vector networks. Machine learning 20, 3 (1995), 273–297.

De Clercq, J. Single sign-on architectures. In Infrastructure Security. Springer, Bristol, UK, 2002,

–58.

De Reuver, M. and Haaker, T. Designing viable business models for context-aware mobile

services. Telematics and Informatics 26, 3 (2009), 240–248.

De Vos, H., Haaker, T., and Teerling, M. Consumer value of context aware and location based

mobile services. BLED 2008 Proceedings, (2008), 50–62.

Dey, A.K. Context-aware computing: The CyberDesk project. Proceedings of the AAAI 1998

Spring Symposium on Intelligent Environments, (1998), 51–54.

Freudiger, J., Manshaei, M.H., Hubaux, J.-P., and Parkes, D.C. On non-cooperative location

privacy: a game-theoretic analysis. Proceedings of the 16th ACM conference on Computer and

communications security, ACM (2009), 324–337.

Hull, R., Neaves, P., and Bedford-Roberts, J. Towards situated computing. First International

Symposium on Wearable Computers, IEEE (1997), 146–153.

Inglesant, P.G. and Sasse, M.A. The true cost of unusable password policies: password use in the

wild. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM

(2010), 383–392.

King, N.J. and Jessen, P.W. Profiling the mobile customer–Privacy concerns when behavioural

advertisers target mobile phones–Part I. Computer Law & Security Review 26, 5 (2010), 455–478.

Krumm, J. A survey of computational location privacy. Personal and Ubiquitous Computing 13, 6

(2009), 391–399.

Lewis, K.D. and Lewis, J.E. Web single sign-on authentication using SAML. International Journal

of Computer Science Issues 2, (2009), 41–48.

Lingras, P. and Butz, C.J. Precision and recall in rough support vector machines. IEEE

International Conference on Granular Computing, IEEE (2007), 654–654.

Liu, Z., Bonazzi, R., Fritscher, B., and Pigneur, Y. Privacy-friendly business models for locationbased

mobile services. Journal of theoretical and applied electronic commerce research 6, 2

(2011), 90–107.

McCole, P., Ramsey, E., and Williams, J. Trust considerations on attitudes towards online

purchasing: The moderating effect of privacy and security concerns. Journal of Business Research

, 9 (2010), 1018–1024.

Mizouni, R., Matar, M.A., Al Mahmoud, Z., Alzahmi, S., and Salah, A. A framework for contextaware

self-adaptive mobile applications SPL. Expert Systems with applications 41, 16 (2014),

–7564.

Moorman, C., Zaltman, G., and Deshpande, R. Relationships between providers and users of

market research: The dynamics of trust. Journal of marketing research 29, 3 (1992), 314–328.

Morris, M., Schindehutte, M., and Allen, J. The entrepreneur’s business model: toward a unified

perspective. Journal of business research 58, 6 (2005), 726–735.

Osterwalder, A. The business model ontology: A proposition in a design science approach. 2004.

Osterwalder, A. and Pigneur, Y. An e-Business Model Ontology for Mobile E-Business. 15th Bled

Electronic Commerce Conference e-Reality: Constructing the e-Economy, (2002), 429–436.

Osterwalder, A. and Pigneur, Y. Modeling value propositions in e-Business. Proceedings of the

th international conference on Electronic commerce, ACM (2003), 429–436.

Osterwalder, A. and Pigneur, Y. Business model generation: a handbook for visionaries, game

changers, and challengers. John Wiley & Sons, New York, USA, 2010.

Pathak, V. and Iftode, L. Byzantine fault tolerant public key authentication in peer-to-peer

systems. Computer Networks 50, 4 (2006), 579–596.

Pennanen, K., Kaapu, T., and Paakki, M.-K. Trust, Risk, Privacy, and Security in E-Commerce -

Google Search. Proceedings of the ICEB + eBRF Conference, (2006).

Pevzner, L. and Hearst, M.A. A critique and improvement of an evaluation metric for text

segmentation. Computational Linguistics 28, 1 (2002), 19–36.

Radha, V. and Reddy, D.H. A Survey on single sign-on techniques. Procedia Technology 4,

(2012), 134–139.

Rao, B. and Minakakis, L. Evolution of mobile location-based services. Communications of the

ACM 46, 12 (2003), 61–65.

Raphael, A. and Zott, C. Value creation in e-business. Strategic management journal 22, 6/7

(2001), 493–520.

Ryan, N., Pascoe, J., and Morse, D. Enhanced reality fieldwork: the context aware archaeological

assistant. Bar International Series 750, (1999), 269–274.

Sakimura, N., Jones, M., de Medeiros, B., and Mortimore, C. Openid connect basic client profile

0-draft 28. OpenID Connect Specs, 2013. http://openid.net/specs/openid-connect-basic-1_0-

html.

Schilit, B., Adams, N., and Want, R. Context-aware computing applications. in First workshop of

Mobile Computing Systems and Applications, IEEE (1994), 85–90.

Schilit, B.N. and Theimer, M.M. Disseminating active map information to mobile hosts. Network,

IEEE 8, 5 (1994), 22–32.

Sebastiani, F. Machine learning in automated text categorization. ACM computing surveys

(CSUR) 34, 1 (2002), 1–47.

Smith, H.J., Milberg, S.J., and Burke, S.J. Information privacy: measuring individuals’ concerns

about organizational practices. MIS quarterly, (1996), 167–196.

Sterngold, J. Say Goodbye to All Those Passwords-Businessweek. BusinessWeek: Online

Magazine, 2011.

Suriadi, S., Foo, E., and Jøsang, A. A user-centric federated single sign-on system. Journal of

Network and Computer Applications 32, 2 (2009), 388–401.

Vapnik, V. The nature of statistical learning theory. Springer Science & Business Media, 2013.

Wegmann, A. On the Systemic Enterprise Architecture Methodology (SEAM). Proceedings of the

th International Conference on Enterprise Information Systems, (2003), 483–490.

Westin, A.F. Privacy and freedom. Washington and Lee Law Review 25, 1 (1968), 166–170.

Xu, H., Teo, H.-H., Tan, B.C., and Agarwal, R. The role of push-pull technology in privacy

calculus: the case of location-based services. Journal of Management Information Systems 26, 3

(2009), 135–174.

Zott, C., Amit, R., and Massa, L. The business model: recent developments and future research.

Journal of management 37, 4 (2011), 1019–1042.

Nokia Siemens Networks: Privacy Survey 2009. 2009.

Downloads

Published

2016-09-28

How to Cite

LIU, Z., BONAZZI, R. ., & PIGNEUR, Y. . (2016). PRIVACY-BASED ADAPTIVE CONTEXT-AWARE AUTHENTICATION SYSTEM FOR PERSONAL MOBILE DEVICES. Journal of Mobile Multimedia, 12(1-2), 159–180. Retrieved from https://journals.riverpublishers.com/index.php/JMM/article/view/4493

Issue

Section

Articles