Continuous Authentication Leveraging Matrix Profile

被引:0
|
作者
Ibanez-Lissen, Luis [1 ]
de Fuentes, Jose Maria [1 ,2 ]
Gonzalez-Manzano, Lorena [1 ,3 ]
Anciaux, Nicolas [4 ]
机构
[1] Univ Carlos III Madrid, Madrid, Spain
[2] Inria, Palaiseau, France
[3] Inst Politech Paris, Palaiseau, France
[4] U ParisSaclay, Inria, UVSQ, Palaiseau, France
来源
19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024 | 2024年
关键词
Continuous authentication; privacy; data minimization; storage limitation; matrix profile; deep learning;
D O I
10.1145/3664476.3664481
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Continuous Authentication (CA) mechanisms involve managing sensitive data from users which may change over time. Both requirements (privacy and adapting to new users) lead to a tension in the amount and granularity of the data at stake. However, no previous work has addressed them together. This paper proposes a CA approach that leverages incremental Matrix Profile (MP) and Deep Learning using accelerometer data. Results show that MP is effective for CA purposes, leading to 99% of accuracy when a single user is authorized. Besides, the model can on-the-fly increase the set of authorized users up to 10 while offering similar accuracy rates. The amount of input data is also characterized - the last 15 s. of data in the user device require 0.4 MB of storage and lead to a CA accuracy of 97% even with 10 authorized users.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Trends in User Identity and Continuous Authentication
    Lopes dos Santos, Uelison Jean
    da Costa, Cristiano Andre
    Mayer, Andre Henrique
    dos Reis, Eduardo Souza
    Cruz Maldonado, Juan Eduardo
    Victoria Barbosa, Jorge Luis
    Antunes, Rodolfo Stoffel
    Righi, Rodrigo da Rosa
    Flores, Nelson Eduardo
    COMPUTER, 2022, 55 (11) : 52 - 61
  • [42] Performance evaluation of continuous authentication systems
    Bours, Patrick
    Mondal, Soumik
    IET BIOMETRICS, 2015, 4 (04) : 220 - 226
  • [43] Shared Keystroke Dataset for Continuous Authentication
    Sun, Yan
    Ceker, Hayreddin
    Upadhyaya, Shambhu
    2016 8TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS 2016), 2016,
  • [44] PARTIAL FACE DETECTION FOR CONTINUOUS AUTHENTICATION
    Mahbub, Upal
    Patel, Vishal M.
    Chandra, Deepak
    Barbello, Brandon
    Chellappa, Rama
    2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2016, : 2991 - 2995
  • [45] Continuous User Authentication using WiFi
    Huang, Pengcheng
    Zhang, Dongheng
    Geng, Ruixu
    Chen, Yan
    PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 2083 - 2088
  • [46] Continuous Authentication Using Behavioral Biometrics
    Deutschmann, Ingo
    Nordstrom, Peder
    Nilsson, Linus
    IT PROFESSIONAL, 2013, 15 (04) : 12 - 15
  • [47] Known User Continuous Authentication System
    Brosso, Ines
    Ferreira, Fernando
    Bressan, Graca
    Ruggiero, Wilson V.
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 747 - +
  • [48] Continuous Authentication and Authorization for the Internet of Things
    Shahzad, Muhammad
    Singh, Munindar P.
    IEEE INTERNET COMPUTING, 2017, 21 (02) : 86 - 90
  • [49] Silent and Continuous Authentication in Mobile Environment
    Canfora, Gerardo
    di Notte, Paolo
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 97 - 108
  • [50] Continuous Authentication using Mouse Dynamics
    Mondal, Soumik
    Bours, Patrick
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG 2013), 2013,