Abstract
In order to meet the growing needs of organizations and individuals to access services and systems remotely, especially during the period of the covid-19 pandemic, the use of I&AM systems is increasingly widespread and optimized. Henceforth regulated by the GDPR, these systems must meet privacy requirements in order to strengthen citizens’ control over their personal data. Artificial Intelligence has proven its efficiency in offering methods to secure I&AM processes. In this direction, the main contributions of this paper consist in identifying the challenges facing I&AM process that are: identification, authentication, authorization, auditing/monitoring and accountability. Afterward, we study how these extracted challenges have been addressed by conducting a comprehensive survey of ML applications for the enhancement of I&AM’s five processes. Besides, we conduct an analysis of the studied solutions based on Cognitive Project Management for Artificial Intelligence (CPMAI) methodology. Finally, some future research directions are identified.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
- 15.
- 16.
- 17.
- 18.
- 19.
References
Crawford, M., Khoshgoftaar, T.M., Prusa, J.D., Richter, A.N., Al Najada, H.: Survey of review spam detection using machine learning techniques. J. Big Data 2(1), 1–24 (2015). https://doi.org/10.1186/s40537-015-0029-9
Hardy, W.: A deep learning framework for intelligent malware detection. In: Proceedings of the International Conference Data Mining (ICDM), Barcelona, Spain, pp. 12–15 (2016)
Mirsky, Y.: An ensemble of autoencoders for online network intrusion detection. In: Network and Distributed System Security Symposium (2018)
Wang, Z.: The Applications of Deep Learning on Traffic Identification, vol. 24, no. 11, pp. 1–10. BlackHat, USA (2015)
Lotfollahi, M., Jafari Siavoshani, M., Shirali Hossein Zade, R., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft. Comput. 24(3), 1999–2012 (2019). https://doi.org/10.1007/s00500-019-04030-2
Shi, C.: Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In: Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing (2017)
Sanakoyeu, A.: Deep unsupervised learning of visual similarities. Pattern Recognit. 78, C 331–343 (2018)
Nunez-Iglesias, J.: Machine learning of hierarchical clustering to segment 2D and 3D images. PloS One 8(8) (2013)
Gibert, D.: Convolutional Neural Networks for Malware Classification. Universitat Politècnica de Catalunya, Spain (2016)
Zeng, F.: Classification for DGA-based malicious domain names with deep learning architectures. Int. J. Intell. Inf. Syst. 6, 67–71 (2017)
Wang, W.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: Proceedings of the 2017 IEEE International Conference Intelligence and Security Informatics, pp. 22–24 (2017)
Kobojek, P.: Application of recurrent neural networks for user verification based on keystroke dynamics. J. Telecommun. Inf. Technol. 80–90 (2016)
He, Y.: Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8, 2505–2516 (2017)
Hester, T.: Deep Q-learning from demonstrations. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 32(1) (2018)
Chatterjee, M.: Detecting phishing websites through deep reinforcement learning. In: IEEE 43rd Annual Computer Software and Applications Conference, vol. 2, pp. 227–232 (2019)
Han, Y.: Reinforcement learning for autonomous defence in software-defined networking. In: International Conference on Decision and Game Theory for Security, pp. 145–165 (2018)
Xiao, L.W.: PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Trans. Veh. Technol. 65(12), 10037–10047 (2016)
Hassan, W.: Towards Scalable Cluster Auditing through Grammatical Inference Over Provenance Graphs. NDSS (2018)
Feng, C.: A user-centric machine learning framework for cyber security operations center. In: IEEE International Conference on Intelligence and Security Informatics, pp. 173–175 (2017)
Lin, Y.: Improving person re-identification by attribute and identity learning. Pattern Recognit. 95 (2017)
Liu, Y.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. Comput. Vis. Pattern Recognit. 389–398 (2018)
Ahmadi, N.: An intelligent method for iris recognition using supervised machine learning techniques. Opt. Laser Technol. 120 (2019)
Radzi, S.A.: Finger-vein biometric identification using convolutional neural network. Turk. J. Electr. Eng. Comput. Sci. 24 (2016)
Agbinya, J.I.: 16 Digital identity management system using artificial neural networks. In: Applied Data Analytics–Principles and Applications, pp. 259–276 (2019)
Valero, J.: Machine Learning as an Enabler of Continuous and Adaptive Authentication in Multimedia Mobile Devices. Handbook of Research on Multimedia Cyber Security (2020)
Outchakoucht, A.: Dynamic access control policy based on blockchain and machine learning for the internet of things. IJACSA 8(7), 417–424 (2017)
Cotrini, C.: Mining ABAC rules from sparse logs. In: IEEE European Symposium on Security and Privacy (EuroS&P), pp. 31–46 (2018)
Munonye, K., Péter, M.: Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow. Int. J. Inf. Secur. 21(2), 223–237 (2021). https://doi.org/10.1007/s10207-021-00551-w
Hutchinson, B.: Towards accountability for machine learning datasets: practices from software engineering and infrastructure. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency (FAccT 21) (2021)
Raji, I.D.: Closing the AI accountability gap: defining an end-to-end framework for internal algorithmic auditing. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency (2020)
Zoe, L.: Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing. Inf. Sci. 518 (2020)
Xingbo, D.: Open-set face identification with index-of-max hashing by learning. Pattern Recognit. 103 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Aboukadri, S., Ouaddah, A., Mezrioui, A. (2023). Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Identity and Access Management Field: Challenges and State of the Art. In: Hassanien, A.E., Snášel, V., Tang, M., Sung, TW., Chang, KC. (eds) Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics 2022. AISI 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 152. Springer, Cham. https://doi.org/10.1007/978-3-031-20601-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-20601-6_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20600-9
Online ISBN: 978-3-031-20601-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)