ReCRED project takes device-centric access control into the future

January 15, 2016

With e-commerce now exceeding 1 trillion USD per annum, the sharing economy on the rise, and the emergence of the Internet of Things, the need for reliable and user-friendly authentication and authorization mechanisms is more pressing than ever. Researchers from IMDEA Networks are collaborating in the newly launched ReCRED (ReCRED: Real-world Identities to Privacy-preserving and Attribute-based CREDentials)– a research project that aims to improve end-user internet security using the mobile as an authorization proxy.

The ultimate goal of ReCRED is to promote the user's personal mobile device to the role of a unified authentication and authorization proxy towards the digital world. ReCRED adopts an incrementally deployable strategy in two complementary directions: extensibility in the type and nature of supported stakeholders and services (from local access control to online service access), as well as flexibility and extensibility in the set of supported authentication and access control techniques; from widely established and traditional ones to emerging authentication and authorization protocols as well as cryptographically advanced attribute-based access control approaches.

Simplicity, usability, and users privacy is accomplished by: (i) hiding inside the device all the complexity involved in the aggregation and management of multiple digital identifiers and access control attribute credentials, as well as the relevant interaction with the network infrastructure and with identity consolidation services; (ii) integrating in the device support for widespread identity management standards and their necessary extensions; and (iii) controlling the exposure of user credentials to third party service providers.

ReCRED addresses key security and privacy issues such as resilience to device loss, theft and impersonation, via a combination of: (i) local user-to-device and remote device-to-service secure authentication mechanisms; (ii) multi-factor authentication mechanisms based on behavioral and physiological user signatures not bound to the device; (iii) usable identity management and privacy awareness tools; (iv) usable tools that offer the ability for complex reasoning of authorization policies through advanced learning techniques. ReCRED's viability will be assessed via four large-scale realistic pilots in real-world operational environments. The pilots will demonstrate the integration of the developed components and their suitability for end-users, so as to show their TRL7 readiness.

A research project with an end user focus

Being an innovation project, ReCRED does not nearly limits to develop and prototype technologies or systems, but comprises a broad set of activities devised to assess the impact of such technologies over real world end users, identify business strategies to exploit the ReCRED system and its individual technology components, and promote ReCRED's technologies to the perspective users and the research and innovation community.

Explore further: Comfort is important in identification

More information:

Related Stories

Comfort is important in identification

December 10, 2015

VTT Technical Research Centre of Finland has conducted a study about user attitudes to different personal identification methods. The most popular identification methods were internet banking access codes and passwords. The ...

Making mobile health effective and secure

December 18, 2015

With Internet-connected medical technology and digitized health records on the rise, cybersecurity is a growing concern for patients and hospitals alike. One research team is taking a holistic approach to strengthening the ...

Detecting and blocking leaky Android apps

May 22, 2015

Nine times out of ten, that Android app is connecting to multiple internet destinations without your knowledge, more than half of them require access to the sensitive, personal information on your mobile device in order to ...

Microsoft beefs up security protection in Windows 10

October 25, 2014

What Microsoft users in business care deeply about—-a system architecture that supports efforts to get their work done efficiently; a work-centric menu to quickly access projects rather than weather readings and movie trailers; ...

Recommended for you

Forget oil, Russia goes crazy for cryptocurrency

August 16, 2017

Standing in a warehouse in a Moscow suburb, Dmitry Marinichev tries to speak over the deafening hum of hundreds of computers stacked on shelves hard at work mining for crypto money.

Researchers clarify mystery about proposed battery material

August 15, 2017

Battery researchers agree that one of the most promising possibilities for future battery technology is the lithium-air (or lithium-oxygen) battery, which could provide three times as much power for a given weight as today's ...

Signs of distracted driving—pounding heart, sweaty nose

August 15, 2017

Distracted driving—texting or absent-mindedness—claims thousands of lives a year. Researchers from the University of Houston and the Texas A&M Transportation Institute have produced an extensive dataset examining how ...


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.