Skip to main content

Easy Identity Management and Enhanced Security in Account Linking

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1217))

Abstract

Users in this era are experiencing inconvenient usability problems while signing in and out of their multiple devices and services. Also, an unpleasant leak of personal information has become another inconvenience and threat that users cannot avoid while managing them. In this environment, usability and security become more important, however these two work in the trade-off relationship so that it requires a new UX solution. In this paper, with Account linking, we suggest improving usability while enhancing security by connecting key account and service accounts permanently. Account linking shortens the steps of sign-in so that it releases users from the burden of remembering multiple IDs and passwords by integrating key account and service account. Its benefit will be maximized when using a shared device where users need to sign in not only the device but also individual services one by one. In addition, it blocks the hazard of personal data leak as it enables signing out all services at once and prevents data remaining on a shared device. Likewise, Account linking is expected to enhance usability and security on multi-device, and multi-user environments.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Safaei, B., Monazzah, A.M.H., Bafroei, M.B., Ejlali, A.: Reliability side-effects in internet of things application layer protocols. In: 2nd International Conference on System Reliability and Safety (ICSRS), pp. 207–212. IEEE (2017)

    Google Scholar 

  2. Oh, S., Yoo, H., Jeong, D.R., Bui, D.H., Shin, I.: Mobile plus: multi-device mobile platform for cross-device functionality sharing. In: 15th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 332–344. ACM (2017)

    Google Scholar 

  3. Braz, C., Seffah, A., M’Raihi, D.: Designing a trade-off between usability and security: a metrics based-model. In: IFID Conference on Human-Computer Interaction (INTERACT), pp. 114–126. Springer, Heidelberg (2007)

    Google Scholar 

  4. Understanding User Authentication: 3 Basics You Should Know. https://swoopnow.com/user-authentication/. Accessed 31 Jan 2020

  5. Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: 9th Workshop on the Economics of Information Security (WEIS) (2010)

    Google Scholar 

  6. Wijayarathna, C., Arachchilage, N.A.G.: An empirical usability analysis of the google authentication API. In: Evaluation and Assessment on Software Engineering (EASE), pp. 268–274. Association for Computing Machinery (2019)

    Google Scholar 

  7. Teng, Z., Zhang, P., Li, X., Nock, W., Rodriguez-Cancio, M., White, J., Schmidt, D. C., Gilmore, D., Nesbitt, J.C.: Authentication and usability in mHealth apps. In: 20th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom). IEEE (2018)

    Google Scholar 

  8. Leiba, B.: Oauth web authorization protocol. J. IEEE Internet Comput. 16(1), 74–77 (2012)

    Article  Google Scholar 

  9. Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J., Seamons, K.: A usability study of five two-factor authentication methods. In: 15th Symposium on Usable Privacy and Security, pp. 357–370. USENIX (2019)

    Google Scholar 

  10. Acemyan, C.Z., Kortum, P., Xiong, J., Wallach, D.S.: 2FA might be secure, but it’s not usable: a summative usability assessment of google’s two-factor authentication (2FA) methods. Hum. Fact. Ergon. Soc. Ann. Meet. 62(1), 1141–1145 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bora Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yoo, D., Ra, J., Kang, B. (2020). Easy Identity Management and Enhanced Security in Account Linking. In: Ahram, T., Falcão, C. (eds) Advances in Usability, User Experience, Wearable and Assistive Technology. AHFE 2020. Advances in Intelligent Systems and Computing, vol 1217. Springer, Cham. https://doi.org/10.1007/978-3-030-51828-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-51828-8_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-51827-1

  • Online ISBN: 978-3-030-51828-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics