Bayesi-Chain: Intelligent Identity Authentication

Juanita Blue, Joan Condell, Tom Lunney

Research output: Contribution to conferencePaperpeer-review

263 Downloads (Pure)

Abstract

In a bid to stamp out fraudulent crime, there is increased pressure on individuals to provide evidence that they possess a ‘real’ identity. Counterfeiting and fake identities have reduced confidence in traditional paper documentation as proof of identity, this has created a demand for an intelligent digital alternative. Recent government implementations and identity trends have also improved the popularity of digital forms of identification.
Authentication of identity is a salient issue in the current climate where identity theft through record duplication is on the rise. Identity resolution techniques have proven effective in filtering duplicated and fake records in identity management systems. These techniques have been further improved by the implementation of machine learning techniques which are capable of revealing patterns and links that have formerly gone undetected. Research has also suggested that incorporating non-standard attributes in the form of social contextual data can increase the efficiency and success-rate of these fraud detection methods.
In the digital age where individuals are creating large digital footprints, online accounts and activities can prove to be a valuable source of information that may contribute to ‘proof’ that an asserted identity is genuine. Online social contextual data – or ‘Digital identities’ -- pertaining to real people are built over time and bolstered by associated accounts, relationships and attributes. This data is difficult to fake and therefore may have the capacity to provide proof of a ‘real’ identity.
This paper outlines the design and initial development of a solution that utilizes data sourced from an individual’s digital footprint to assess the likelihood that it pertains to a ‘real’ identity. This is achieved through application of machine learning and Bayesian probabilistic modelling techniques. Where identity sources are considered reliable, a secure and intelligent digital identification artefact will be created. This artefact will emulate a blockchain-inspired ledger and may subsequently be used to prove identity in place of traditional paper documentation.
Original languageEnglish
Pages1-6
Number of pages6
Publication statusPublished (in print/issue) - 20 Jun 2018
Event29th Irish signals and Systems Conference 2018 - Queens University, Belfast, Northern Ireland
Duration: 21 Jun 201822 Jun 2018
http://www.issc.ie/site/view/7/

Conference

Conference29th Irish signals and Systems Conference 2018
Country/TerritoryNorthern Ireland
CityBelfast
Period21/06/1822/06/18
Internet address

Keywords

  • Identity
  • authentication
  • digital footprint
  • privacy
  • security

Fingerprint

Dive into the research topics of 'Bayesi-Chain: Intelligent Identity Authentication'. Together they form a unique fingerprint.

Cite this