Rajput, Ajinkya and Gopinath, K (2017) Towards a More Secure Aadhaar. In: 13th International Conference on Information Systems Security, ICISS 2017, 16 December 2017 - 20 December 2017, Mumbai, pp. 283-300.
PDF
lec_not_com_sci_283-300_2017.pdf - Published Version Restricted to Registered users only Download (346kB) | Request a copy |
Abstract
Aadhaar is the national identities project of Government of India. The main benefit of Aadhaar is expected to be better decision making using modern analytics as citizens use such an identity to avail services from various government as well as private service providers; this necessarily involves building a huge store with necessary information on citizens such as mapping of ids to biometrics. Such stores raise many security and privacy concerns and therefore should be designed and analyzed very carefully. The threat model for such systems should address both internal and external attackers. Previous writings and research work [12] in this area have discussed problems such as illegal profiling and tracking of individuals, authentication without consent, collusion of multiple service providers leading to correlation of user data, and use of fake biometrics. While some analyses have focussed on cryptography to provide a solution, a comprehensive and workable solution for, say, illegal profiling, is still lacking, and there are also many problems from a systems perspective that need to be addressed such as access control models to constrain the access to sensitive data as well as integrity of its metadata. In this paper, we discuss solutions to such problems, esp illegal profiling.
Item Type: | Conference Paper |
---|---|
Series.: | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
Publisher: | Springer Verlag |
Additional Information: | The Copyright of this article belongs to the Springer Verlag |
Keywords: | Aadhaar; National identities; Privacy preserving identities; Access control; Biometrics; Data privacy; Decision making; Information systems; Access control models; External attacker; Government of India; Multiple services; National identities; Privacy preserving; Security and privacy; Crime |
Department/Centre: | Division of Electrical Sciences > Computer Science & Automation |
Date Deposited: | 25 May 2022 05:06 |
Last Modified: | 25 May 2022 11:13 |
URI: | https://eprints.iisc.ac.in/id/eprint/72612 |
Actions (login required)
View Item |