Generating repudiable, memorizable and privacy preserving security questions using the Propp Theory of Narrative

Pan, Lei and Bangay, Shaun 2014, Generating repudiable, memorizable and privacy preserving security questions using the Propp Theory of Narrative, in CyberC 2014 : The 6th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, IEEE, Piscataway, N.J., pp. 1-7, doi: 10.1109/CyberC.2014.20.

Attached Files
Name Description MIMEType Size Downloads

Title Generating repudiable, memorizable and privacy preserving security questions using the Propp Theory of Narrative
Author(s) Pan, LeiORCID iD for Pan, Lei orcid.org/0000-0002-4691-8330
Bangay, Shaun
Conference name Cyber-Enabled Distributed Computing and Knowledge Discovery. Conference (6th : 2014 : Shanghai, China)
Conference location Shanghai, China
Conference dates 10-12 Oct. 2014
Title of proceedings CyberC 2014 : The 6th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
Editor(s) [Unknown]
Publication date 2014
Conference series Cyber-Enabled Distributed Computing and Knowledge Discovery Conference
Start page 1
End page 7
Total pages 7
Publisher IEEE
Place of publication Piscataway, N.J.
Summary  Security questions are often based on personal information that is limited in variety, available in the public record and very difficult to change if compromised. A personalized folktale shared only by the communicating parties provides memorizable basis for individualized security questions that can be readily replaced in the event of a security breach. We utilize the Propp theory of narrative to provide a basis of abstraction for story generation systems. We develop a proof-of-concept system based on placeholder replacement to demonstrate the generation of repudiate and memorizable questions and answers suitable for online security questions. A 3-component protocol is presented that demonstrates the use of this process to derive a shared secret key through privacy amplification. This combination of story generation and communication security provides the basis for improvements in current security question practice.
Language eng
DOI 10.1109/CyberC.2014.20
Field of Research 080111 Virtual Reality and Related Simulation
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2014, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30067685

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 525 Abstract Views, 41 File Downloads  -  Detailed Statistics
Created: Mon, 24 Nov 2014, 15:15:10 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.