Abstract
Motivated by applications in online privacy, user authentication and profiling, we discuss the complexity of various problems generalized from the classic 0-1 knapsack problem. In our scenarios, we assume the existence of a scoring function that evaluates the confidence in the personal online profile or authenticity of an individual based on a subset of acquired credentials and facts about an individual and show how the specific properties of that function affect the computational complexity of the problem, providing both NP-completeness proofs under certain conditions as well as pseudo-polynomial-time solutions under others.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agostini, A., Bettini, C., Riboni, D.: Loosely coupling ontological reasoning with an efficient middleware for context-awareness. In: 2nd Ann. Intl. Conf. on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), pp. 175–182 (July 2005), http://dx.doi.org/10.1109/MOBIQUITOUS.2005.34
Altshuler, Y., Aharony, N., Elovici, Y., Pentland, A., Cebrian, M.: Stealing reality. Tech. rep., arXiv (October 2010), http://arxiv.org/abs/1010.1028v1
Balagani, K.S., Phoha, V.V., Ray, A., Phoha, S.: On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recogn. Lett. 32(7), 1070–1080 (2011), http://dx.doi.org/10.1016/j.patrec.2011.02.014
Bettini, C., Pareschi, L., Riboni, D.: Efficient profile aggregation and policy evaluation in a middleware for adaptive mobile applications. Pervasive and Mobile Computing 4(5), 697–718 (2008)
Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Semantic web-based social network access control. Computers & Security 30(2-3), 108–115 (2011), http://dx.doi.org/10.1016/j.cose.2010.08.003
Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur. 13, 6:1–6:38 (2009), http://doi.acm.org/10.1145/1609956.1609962
Domingo-Ferrer, J.: Rational Privacy Disclosure in Social Networks. In: Torra, V., Narukawa, Y., Daumas, M. (eds.) MDAI 2010. LNCS, vol. 6408, pp. 255–265. Springer, Heidelberg (2010), http://dx.doi.org/10.1007/978-3-642-16292-3_25
Domingo-Ferrer, J.: Coprivacy: Towards a Theory of Sustainable Privacy. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 258–268. Springer, Heidelberg (2010), http://dx.doi.org/10.1007/978-3-642-15838-4_23
Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54, 86–95 (2011), http://doi.acm.org/10.1145/1866739.1866758
Gambs, S., Killijian, M.O., del Prado Cortez, M.N.: Show me how you move and I will tell you who you are. Transactions on Data Privacy 4(2), 103–126 (2011)
Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Series of Books in the Mathematical Sciences. W. H. Freeman & Co. Ltd. (January 1979), http://www.worldcat.org/isbn/0716710455
Goodrich, M.T., Tamassia, R.: Algorithm Design: Foundations, Analysis, and Internet Examples. Wiley (September 2001), http://www.worldcat.org/isbn/0471383651
Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data 5, 6:1–6:30 (2010), http://doi.acm.org/10.1145/1870096.1870102
Pareschi, L., Riboni, D., Agostini, A., Bettini, C.: Composition and generalization of context data for privacy preservation. In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), pp. 429–433 (March 2008), http://dx.doi.org/10.1109/PERCOM.2008.47
Sheng, Y., Phoha, V.V., Rovnyak, S.M.: A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics, Part B 35(4), 826–833 (2005), http://dx.doi.org/10.1109/TSMCB.2005.846648
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Duncan, C.A., Phoha, V.V. (2012). On the Complexity of Aggregating Information for Authentication and Profiling. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-28879-1_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28878-4
Online ISBN: 978-3-642-28879-1
eBook Packages: Computer ScienceComputer Science (R0)