skip to main content
10.1145/3196494.3201593acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
poster

POSTER: Address Authentication Based on Location History

Published: 29 May 2018 Publication History

Abstract

This paper proposes an address authentication method based on the user's location history. For address authentication, existing studies discover the user's regular locations called location of interest (LOI) from the location history by using clustering algorithms. They authenticate an address if the address is contained in one of the LOIs. However, unnecessary LOIs which are unrelated to the address may lead to false authentications of illegitimate addresses, i.e. other users' addresses or feigned addresses. The proposed method tries to reduce the authentication error rate by eliminating unnecessary LOIs with the distinguishing properties of address. In other words, only few LOIs that satisfy the properties (long duration, high density, and consistency) are kept and utilized for address authentication. Experimental results show that the proposed method decreases the authentication error rate compared with previous approaches using time-based clustering and density-based clustering.

References

[1]
Upal Mahbub and Rama Chellappa. 2016. PATH: Person Authentication Using Trace Histories. In Proceedings of the IEEE 7th Annual Ubiquitous Computing, Electronics &Mobile Communication Conference (UEMCON '16). IEEE, New York, NY, USA, 1--8.
[2]
Yang Ye, Yu Zheng, Yukun Chen, Jianhua Feng, and Xing Xie. 2009. Mining Individual Life Pattern Based on Location History. In Proceedings of the 10th International Conference on Mobile Data Management (MDM '09). IEEE, Taipei, Taiwan, 1--10.
[3]
Changqing Zhou, Dan Frankowski, Pamela Ludford, Shashi Shekhar, and Loren Terveen. 2007 Discovering Personally Meaningful Places: an Interactive Clustering Approach. ACM Trans. Information Systems. 25, 3 (July 2007), 12--es.
[4]
Yu Zheng, Lizhu Zhang, Xing Xie, and Wei-Ying Ma. 2009. Mining Interesting Locations and Travel Sequences from GPS Trajectories. In Proceedings of the 18th international conference on World wide web. ACM, Madrid, Spain, 791--800.
[5]
Aditi Gupta, Markus Miettinen, N. Asokan, and Marcin Nagy. 2013. Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling. In Proceedings of the 4th ASE/IEEE International Conference on Social Computing (SocialCom '13). IEEE, Amsterdam, Netherlands, 471--480.
[6]
Jong Hee Kang, William Welbourne, Benjamin Stewart, and Gaetano Borriello. 2005. Extracting Places from Traces of Locations. ACM SIGMOBILE Mobile Computing and Communications Review. 9, 3 (July 2005), 58--68.
[7]
Quan Yuan, Gao Cong, Zongyang Ma, Aixin Sun, and Nadia Magnenat-Thalmann. 2013. Time-aware Point-of-interest Recommendation. In Proceedings of the 36th international ACM conference on Research and development in information retrieval (SIGIR '13). ACM, Dublin, Ireland, 363--372.
[8]
Martin Ester, Hans-Peter Kriegel, Jiirg Sander, and Xiaowei Xu. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of 2nd International Conference on Knowledge Discovery and Data Mining (KDD '96). AAAI, Portland, Oregon, USA, 226--231.

Cited By

View all
  • (2020)Address Authentication Method for Sustainable Social QualificationSustainability10.3390/su1205170012:5(1700)Online publication date: 25-Feb-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications Security
May 2018
866 pages
ISBN:9781450355766
DOI:10.1145/3196494
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 May 2018

Check for updates

Author Tags

  1. address authentication
  2. clustering
  3. context of interest

Qualifiers

  • Poster

Funding Sources

  • Institute for Information &Communications Technology Promotion (IITP) grant funded by the Korean government (MSIT)
  • National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT)

Conference

ASIA CCS '18
Sponsor:

Acceptance Rates

ASIACCS '18 Paper Acceptance Rate 52 of 310 submissions, 17%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)2
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Address Authentication Method for Sustainable Social QualificationSustainability10.3390/su1205170012:5(1700)Online publication date: 25-Feb-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media