Skip to main content

On the Complexity of Aggregating Information for Authentication and Profiling

  • Conference paper
Book cover Data Privacy Management and Autonomous Spontaneus Security (DPM 2011, SETOP 2011)

Abstract

Motivated by applications in online privacy, user authentication and profiling, we discuss the complexity of various problems generalized from the classic 0-1 knapsack problem. In our scenarios, we assume the existence of a scoring function that evaluates the confidence in the personal online profile or authenticity of an individual based on a subset of acquired credentials and facts about an individual and show how the specific properties of that function affect the computational complexity of the problem, providing both NP-completeness proofs under certain conditions as well as pseudo-polynomial-time solutions under others.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agostini, A., Bettini, C., Riboni, D.: Loosely coupling ontological reasoning with an efficient middleware for context-awareness. In: 2nd Ann. Intl. Conf. on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), pp. 175–182 (July 2005), http://dx.doi.org/10.1109/MOBIQUITOUS.2005.34

  2. Altshuler, Y., Aharony, N., Elovici, Y., Pentland, A., Cebrian, M.: Stealing reality. Tech. rep., arXiv (October 2010), http://arxiv.org/abs/1010.1028v1

  3. Balagani, K.S., Phoha, V.V., Ray, A., Phoha, S.: On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recogn. Lett. 32(7), 1070–1080 (2011), http://dx.doi.org/10.1016/j.patrec.2011.02.014

    Article  Google Scholar 

  4. Bettini, C., Pareschi, L., Riboni, D.: Efficient profile aggregation and policy evaluation in a middleware for adaptive mobile applications. Pervasive and Mobile Computing 4(5), 697–718 (2008)

    Article  Google Scholar 

  5. Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Semantic web-based social network access control. Computers & Security 30(2-3), 108–115 (2011), http://dx.doi.org/10.1016/j.cose.2010.08.003

    Article  Google Scholar 

  6. Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur. 13, 6:1–6:38 (2009), http://doi.acm.org/10.1145/1609956.1609962

    Google Scholar 

  7. Domingo-Ferrer, J.: Rational Privacy Disclosure in Social Networks. In: Torra, V., Narukawa, Y., Daumas, M. (eds.) MDAI 2010. LNCS, vol. 6408, pp. 255–265. Springer, Heidelberg (2010), http://dx.doi.org/10.1007/978-3-642-16292-3_25

    Chapter  Google Scholar 

  8. Domingo-Ferrer, J.: Coprivacy: Towards a Theory of Sustainable Privacy. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 258–268. Springer, Heidelberg (2010), http://dx.doi.org/10.1007/978-3-642-15838-4_23

    Chapter  Google Scholar 

  9. Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54, 86–95 (2011), http://doi.acm.org/10.1145/1866739.1866758

    Article  Google Scholar 

  10. Gambs, S., Killijian, M.O., del Prado Cortez, M.N.: Show me how you move and I will tell you who you are. Transactions on Data Privacy 4(2), 103–126 (2011)

    MathSciNet  Google Scholar 

  11. Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Series of Books in the Mathematical Sciences. W. H. Freeman & Co. Ltd. (January 1979), http://www.worldcat.org/isbn/0716710455

  12. Goodrich, M.T., Tamassia, R.: Algorithm Design: Foundations, Analysis, and Internet Examples. Wiley (September 2001), http://www.worldcat.org/isbn/0471383651

  13. Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data 5, 6:1–6:30 (2010), http://doi.acm.org/10.1145/1870096.1870102

    Google Scholar 

  14. Pareschi, L., Riboni, D., Agostini, A., Bettini, C.: Composition and generalization of context data for privacy preservation. In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), pp. 429–433 (March 2008), http://dx.doi.org/10.1109/PERCOM.2008.47

  15. Sheng, Y., Phoha, V.V., Rovnyak, S.M.: A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics, Part B 35(4), 826–833 (2005), http://dx.doi.org/10.1109/TSMCB.2005.846648

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Duncan, C.A., Phoha, V.V. (2012). On the Complexity of Aggregating Information for Authentication and Profiling. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28879-1_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28878-4

  • Online ISBN: 978-3-642-28879-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics