Biometric data on the edge for secure, smart and user tailored access to cloud services

被引:10
|
作者
Barra, Silvio [1 ]
Castiglione, Aniello [2 ]
Narducci, Fabio [2 ]
De Marsico, Maria [3 ]
Nappi, Michele [4 ]
机构
[1] Univ Cagliari, Dept Math & Comp Sci, Cagliari, Italy
[2] Univ Naples Parthenope, Dept Sci & Technol, Naples, Italy
[3] Sapienza Univ Rome, Rome, Italy
[4] Univ Salerno, Dept Comp Sci, Salerno, Italy
关键词
Edge Computing; Mobile Computing; IoT; Biometric Recognition; Context Awareness; RECOGNITION; SYSTEMS;
D O I
10.1016/j.future.2019.06.019
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We are living an era in which each of us is immersed in a fully connected environment. The smart devices worn everyday by everyone let the users be projected into the so called IoT world, whose main aim is to provide tools and strategies to solve problems of everyday life as well as to improve well-being and quality of life. Such a goal can be achieved in several ways, but consumer specific services should be provided according to their daily habits, as well as temporary needs. This can be made possible by current mobile devices and their built-in sensors, which can infer the context where the owner operates and the performed activities to build up a user profile. In this work, an architecture for cloud services supply is proposed, based on subject continuous authentication and context (status/activity) recognition. A subject and the context are authenticated/recognised by means of the cyclic recognition of signals captured by the sensors of his/her smartphone, e.g., accelerometer and gyroscope. In order to test the accuracy of the proposed context recognition, the H-MOG dataset has been used, which provides joint acquisitions of status data (Sitting or Walking) related to the activity performed (Reading, Writing, or Navigating Map). (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:534 / 541
页数:8
相关论文
共 50 条
  • [31] Secure Data Access and Sharing Scheme for Cloud Storage
    Xiong Li
    Saru Kumari
    Jian Shen
    Fan Wu
    Caisen Chen
    SK Hafizul Islam
    [J]. Wireless Personal Communications, 2017, 96 : 5295 - 5314
  • [32] Designing secure and lightweight user access to drone for smart city surveillance
    Hussain, Sajid
    Mahmood, Khalid
    Khan, Muhammad Khurram
    Chen, Chien-Ming
    Alzahrani, Bander A.
    Chaudhry, Shehzad Ashraf
    [J]. Computer Standards and Interfaces, 2021, 80
  • [33] Designing secure and lightweight user access to drone for smart city surveillance
    Hussain, Sajid
    Mahmood, Khalid
    Khan, Muhammad Khurram
    Chen, Chien-Ming
    Alzahrani, Bander A.
    Chaudhry, Shehzad Ashraf
    [J]. COMPUTER STANDARDS & INTERFACES, 2022, 80
  • [34] User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services
    Fathi, Reza
    Salehi, Mohsen Amini
    Leiss, Ernst L.
    [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 516 - 523
  • [35] TOWARDS SECURE AUDIT SERVICES FOR OUTSOURCED DATA IN CLOUD
    Sumalatha, M. R.
    Hemalathaa, S.
    Monika, R.
    Ahila, C.
    [J]. 2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [36] Secure Picture Data Partitioning for Cloud Computing Services
    Leistikow, Rene
    Tavangarian, Djamshid
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 668 - 671
  • [37] Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems
    Duan, Li
    Liu, Dongxi
    Zhang, Yang
    Chen, Shiping
    Liu, Ren Ping
    Cheng, Bo
    Chen, Junliang
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)
  • [38] Secure deduplication for multimedia data with user revocation in cloud storage
    Hyunsoo Kwon
    Changhee Hahn
    Daeyoung Kim
    Junbeom Hur
    [J]. Multimedia Tools and Applications, 2017, 76 : 5889 - 5903
  • [39] Provably secure biometric-based user authentication and key agreement scheme in cloud computing
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4103 - 4119
  • [40] Secure deduplication for multimedia data with user revocation in cloud storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Kim, Daeyoung
    Hur, Junbeom
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 5889 - 5903