{"title":"Policy-driven contextual risk evaluation in OAuth 2.0 authentication frameworks for AI chatbot-based RPA systems","authors":"Soonhong Kwon, Wooyoung Son, Jong-Hyouk Lee","doi":"10.1016/j.compeleceng.2025.110759","DOIUrl":null,"url":null,"abstract":"<div><div>With the advent of smartphones, we can access internet services regardless of location. This shift in environment has led to the demand for services that can be utilized anytime, anywhere. Consequently, Robotic Process Automation (RPA) technology, which automates simple and repetitive tasks in industrial settings, is gaining significant attention. There is a growing trend to combine this with Artificial Intelligence (AI) chatbot technology to achieve full automation and handle higher-level tasks. However, when performing high-level tasks based on an AI chatbot-based RPA system, situations arise where the AI chatbot relies on the user’s judgment. In such scenarios, the absence of an appropriate mechanism or technology to perform identity verification between the user and the AI chatbot exposes the system to security threats like personal information leakage and system takeover. Accordingly, this paper proposes an OAuth 2.0 integrated authentication framework utilizing a context-based risk assessment approach. This framework aims to reduce the likelihood of security threats and minimize the scale of damage caused by such threats. It achieves this by enabling access control based on the user’s context while requiring the user to provide minimal information when utilizing the AI chatbot-based RPA system. More specifically, the proposed framework employs a risk assessment based on the sigmoid function, which accounts for sensitivity variations across different contexts. This approach enables sensitive adjustments to access permissions in response to contextual changes, rather than applying a fixed risk assessment. This demonstrates the framework’s capability to provide a trustworthy automated work environment through appropriate access control. Specifically, the proposed risk assessment formula quantitatively analyzes sensitivity changes for each contextual variable through mathematical interpretation. Based on this, it structurally derives the correlation between risk scores and policies. Furthermore, experimental results confirm consistency between policy flow and risk assessment, such as issuing ‘Full Access Tokens’ in normal situations and applying Access Denied in high-risk situations. Furthermore, using data flow diagrams and STRIDE, potential security threats within the proposed framework were modeled. Simulation of actual security threats demonstrated the framework’s ability to mitigate these threats, with an average latency of 9.22ms and memory usage of 64.00MB required for threat response. This empirically demonstrates that the proposed framework is a valid authentication structure capable of simultaneously achieving real-time performance, security, and lightweight characteristics even in AI-based automated environments.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"128 ","pages":"Article 110759"},"PeriodicalIF":4.9000,"publicationDate":"2025-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625007025","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
With the advent of smartphones, we can access internet services regardless of location. This shift in environment has led to the demand for services that can be utilized anytime, anywhere. Consequently, Robotic Process Automation (RPA) technology, which automates simple and repetitive tasks in industrial settings, is gaining significant attention. There is a growing trend to combine this with Artificial Intelligence (AI) chatbot technology to achieve full automation and handle higher-level tasks. However, when performing high-level tasks based on an AI chatbot-based RPA system, situations arise where the AI chatbot relies on the user’s judgment. In such scenarios, the absence of an appropriate mechanism or technology to perform identity verification between the user and the AI chatbot exposes the system to security threats like personal information leakage and system takeover. Accordingly, this paper proposes an OAuth 2.0 integrated authentication framework utilizing a context-based risk assessment approach. This framework aims to reduce the likelihood of security threats and minimize the scale of damage caused by such threats. It achieves this by enabling access control based on the user’s context while requiring the user to provide minimal information when utilizing the AI chatbot-based RPA system. More specifically, the proposed framework employs a risk assessment based on the sigmoid function, which accounts for sensitivity variations across different contexts. This approach enables sensitive adjustments to access permissions in response to contextual changes, rather than applying a fixed risk assessment. This demonstrates the framework’s capability to provide a trustworthy automated work environment through appropriate access control. Specifically, the proposed risk assessment formula quantitatively analyzes sensitivity changes for each contextual variable through mathematical interpretation. Based on this, it structurally derives the correlation between risk scores and policies. Furthermore, experimental results confirm consistency between policy flow and risk assessment, such as issuing ‘Full Access Tokens’ in normal situations and applying Access Denied in high-risk situations. Furthermore, using data flow diagrams and STRIDE, potential security threats within the proposed framework were modeled. Simulation of actual security threats demonstrated the framework’s ability to mitigate these threats, with an average latency of 9.22ms and memory usage of 64.00MB required for threat response. This empirically demonstrates that the proposed framework is a valid authentication structure capable of simultaneously achieving real-time performance, security, and lightweight characteristics even in AI-based automated environments.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.