| アイテムタイプ |
学術雑誌論文 / Journal Article(1) |
| 公開日 |
2025-06-25 |
| タイトル |
|
|
タイトル |
Web-Biometrics for User Authenticity Verification in Zero Trust Access Control |
| 言語 |
|
|
言語 |
eng |
| キーワード |
|
|
主題Scheme |
Other |
|
主題 |
Zero trust access control |
| キーワード |
|
|
主題Scheme |
Other |
|
主題 |
zero trust network |
| キーワード |
|
|
主題Scheme |
Other |
|
主題 |
web-biometrics |
| キーワード |
|
|
主題Scheme |
Other |
|
主題 |
user authenticity |
| 資源タイプ |
|
|
資源タイプ |
journal article |
| アクセス権 |
|
|
アクセス権 |
open access |
| 著者 |
笹田, 大翔
妙中, 雄三
門林, 雄基
Fall, Doudou
|
| 抄録 |
|
|
内容記述タイプ |
Abstract |
|
内容記述 |
In the case of remote work, once a user completes account authentication, they can continue to access confidential data without further verification of user identity. Thus, if a user’s device or authentication information is leaked/stolen by an adversary or shared with a third party, the confidentiality of the data is violated. Previous studies have proposed classical biometrics-based verification of user authenticity. This method could identify whether a user was an adversary or not, but could not verify whether the account operator was a legitimate user. Moreover, since the architecture of ZTAC was not designed for the use of biometrics, it could not effectively control the various access patterns of adversaries in remote work. In this study, we propose a user authenticity verification method based on biometrics, designed for use in ZTAC. By designing and monitoring web biometrics that can verify that the account operator is a legitimate user, we aim to realize a system that provides appropriate access control for accounts after authentication according to the verification results of behavioral/cognitive patterns on the browser. Achieving dynamic access control independent of authentication results enables secure management of confidential data in remote work. In the evaluation experiment, we classified the access patterns of adversaries in remote work and confirmed that the system can appropriately control each of them. Additionally, measuring the response time to access requests showed that the evaluation experiment resulted in delays of no more than approximately 130 milliseconds, confirming that the migration to the proposed method has a very low impact on the system load. |
| 書誌情報 |
en : IEEE Access
巻 12,
p. 129611-129622,
発行日 2024-06-12
|
| 出版者 |
|
|
出版者 |
IEEE |
| ISSN |
|
|
収録物識別子タイプ |
EISSN |
|
収録物識別子 |
2169-3536 |
| 出版者版DOI |
|
|
関連タイプ |
isReplacedBy |
|
|
識別子タイプ |
DOI |
|
|
関連識別子 |
https://doi.org/10.1109/ACCESS.2024.3413696 |
| 出版者版URI |
|
|
関連タイプ |
isReplacedBy |
|
|
識別子タイプ |
URI |
|
|
関連識別子 |
https://ieeexplore.ieee.org/abstract/document/10555260 |
| 権利 |
|
|
権利情報Resource |
https://creativecommons.org/licenses/by-nc-nd/4.0/ |
|
権利情報 |
$00A92024 The Authors. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/ |
| 著者版フラグ |
|
|
出版タイプ |
NA |
| 助成情報 |
|
|
|
助成機関名 |
Information-Technology Promotion Agency (IPA) |
|
|
研究課題名 |
ICS-CoE Core Human Resources Development Program |