Skip to main content

Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Identity and Access Management Field: Challenges and State of the Art

  • Conference paper
  • First Online:
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics 2022 (AISI 2022)

Abstract

In order to meet the growing needs of organizations and individuals to access services and systems remotely, especially during the period of the covid-19 pandemic, the use of I&AM systems is increasingly widespread and optimized. Henceforth regulated by the GDPR, these systems must meet privacy requirements in order to strengthen citizens’ control over their personal data. Artificial Intelligence has proven its efficiency in offering methods to secure I&AM processes. In this direction, the main contributions of this paper consist in identifying the challenges facing I&AM process that are: identification, authentication, authorization, auditing/monitoring and accountability. Afterward, we study how these extracted challenges have been addressed by conducting a comprehensive survey of ML applications for the enhancement of I&AM’s five processes. Besides, we conduct an analysis of the studied solutions based on Cognitive Project Management for Artificial Intelligence (CPMAI) methodology. Finally, some future research directions are identified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-08.pdf NIST-IDG, 201 7.

  2. 2.

    https://professional.dce.harvard.edu/blog/business-applications-for-artificial-intelligence-an-update-for-2020/.

  3. 3.

    https://www.ibm.com/docs/en/ibm-mq/9.1?topic=mechanisms-identification-authentication.

  4. 4.

    https://www.ibm.com/docs/en/ibm-mq/9.1?topic=mechanisms-identification-authentication.

  5. 5.

    https://www2.deloitte.com/content/dam/Deloitte/us/Documents/risk/us-cloud-and-identity-and-access-management.pdf.

  6. 6.

    https://cs.stanford.edu/people/eroberts/courses/soco/projects/neural-networks/Neuron/index.htm.

  7. 7.

    https://cs.stanford.edu/people/eroberts/courses/soco/projects/neural-networks/Architecture/feedforward.html.

  8. 8.

    https://stanford.edu/~shervine/teaching/cs-230/.

  9. 9.

    http://www.cs.unibo.it/~danilo.montesi/CBD/Beatriz/10.1.1.198.5133.pdf.

  10. 10.

    https://docs.microsoft.com/en-us/azure/machine-learning/team-data-science-process/overview.

  11. 11.

    https://searchitchannel.techtarget.com/blog/Channel-Marker/Cognilytica-expands-on-CRISP-DM-model-for-AI-project-management.

  12. 12.

    https://www.cognilytica.com/cpmai-methodology/.

  13. 13.

    https://www2.deloitte.com/content/dam/Deloitte/us/Documents/audit/us-audit-deloitte-multi-factor-authentication.pdf.

  14. 14.

    https://datatracker.ietf.org/doc/html/rfc6749.

  15. 15.

    https://ahia.org/assets/Uploads/pdfUpload/WhitePapers/DefiningAuditingAndMonitoring.pdf.

  16. 16.

    https://distill.pub/2019/activation-atlas/.

  17. 17.

    https://distill.pub/2019/activation-atlas/.

  18. 18.

    https://gdpr-info.eu/.

  19. 19.

    https://techvisionresearch.com/wp-content/uploads/2018/01/The-Future-of-Identity-Management-2018-final.pdf.

References

  1. Crawford, M., Khoshgoftaar, T.M., Prusa, J.D., Richter, A.N., Al Najada, H.: Survey of review spam detection using machine learning techniques. J. Big Data 2(1), 1–24 (2015). https://doi.org/10.1186/s40537-015-0029-9

    Article  Google Scholar 

  2. Hardy, W.: A deep learning framework for intelligent malware detection. In: Proceedings of the International Conference Data Mining (ICDM), Barcelona, Spain, pp. 12–15 (2016)

    Google Scholar 

  3. Mirsky, Y.: An ensemble of autoencoders for online network intrusion detection. In: Network and Distributed System Security Symposium (2018)

    Google Scholar 

  4. Wang, Z.: The Applications of Deep Learning on Traffic Identification, vol. 24, no. 11, pp. 1–10. BlackHat, USA (2015)

    Google Scholar 

  5. Lotfollahi, M., Jafari Siavoshani, M., Shirali Hossein Zade, R., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft. Comput. 24(3), 1999–2012 (2019). https://doi.org/10.1007/s00500-019-04030-2

    Article  Google Scholar 

  6. Shi, C.: Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In: Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing (2017)

    Google Scholar 

  7. Sanakoyeu, A.: Deep unsupervised learning of visual similarities. Pattern Recognit. 78, C 331–343 (2018)

    Google Scholar 

  8. Nunez-Iglesias, J.: Machine learning of hierarchical clustering to segment 2D and 3D images. PloS One 8(8) (2013)

    Google Scholar 

  9. Gibert, D.: Convolutional Neural Networks for Malware Classification. Universitat Politècnica de Catalunya, Spain (2016)

    Google Scholar 

  10. Zeng, F.: Classification for DGA-based malicious domain names with deep learning architectures. Int. J. Intell. Inf. Syst. 6, 67–71 (2017)

    Google Scholar 

  11. Wang, W.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: Proceedings of the 2017 IEEE International Conference Intelligence and Security Informatics, pp. 22–24 (2017)

    Google Scholar 

  12. Kobojek, P.: Application of recurrent neural networks for user verification based on keystroke dynamics. J. Telecommun. Inf. Technol. 80–90 (2016)

    Google Scholar 

  13. He, Y.: Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8, 2505–2516 (2017)

    Article  Google Scholar 

  14. Hester, T.: Deep Q-learning from demonstrations. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 32(1) (2018)

    Google Scholar 

  15. Chatterjee, M.: Detecting phishing websites through deep reinforcement learning. In: IEEE 43rd Annual Computer Software and Applications Conference, vol. 2, pp. 227–232 (2019)

    Google Scholar 

  16. Han, Y.: Reinforcement learning for autonomous defence in software-defined networking. In: International Conference on Decision and Game Theory for Security, pp. 145–165 (2018)

    Google Scholar 

  17. Xiao, L.W.: PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Trans. Veh. Technol. 65(12), 10037–10047 (2016)

    Article  Google Scholar 

  18. Hassan, W.: Towards Scalable Cluster Auditing through Grammatical Inference Over Provenance Graphs. NDSS (2018)

    Google Scholar 

  19. Feng, C.: A user-centric machine learning framework for cyber security operations center. In: IEEE International Conference on Intelligence and Security Informatics, pp. 173–175 (2017)

    Google Scholar 

  20. Lin, Y.: Improving person re-identification by attribute and identity learning. Pattern Recognit. 95 (2017)

    Google Scholar 

  21. Liu, Y.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. Comput. Vis. Pattern Recognit. 389–398 (2018)

    Google Scholar 

  22. Ahmadi, N.: An intelligent method for iris recognition using supervised machine learning techniques. Opt. Laser Technol. 120 (2019)

    Google Scholar 

  23. Radzi, S.A.: Finger-vein biometric identification using convolutional neural network. Turk. J. Electr. Eng. Comput. Sci. 24 (2016)

    Google Scholar 

  24. Agbinya, J.I.: 16 Digital identity management system using artificial neural networks. In: Applied Data Analytics–Principles and Applications, pp. 259–276 (2019)

    Google Scholar 

  25. Valero, J.: Machine Learning as an Enabler of Continuous and Adaptive Authentication in Multimedia Mobile Devices. Handbook of Research on Multimedia Cyber Security (2020)

    Google Scholar 

  26. Outchakoucht, A.: Dynamic access control policy based on blockchain and machine learning for the internet of things. IJACSA 8(7), 417–424 (2017)

    Article  Google Scholar 

  27. Cotrini, C.: Mining ABAC rules from sparse logs. In: IEEE European Symposium on Security and Privacy (EuroS&P), pp. 31–46 (2018)

    Google Scholar 

  28. Munonye, K., Péter, M.: Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow. Int. J. Inf. Secur. 21(2), 223–237 (2021). https://doi.org/10.1007/s10207-021-00551-w

    Article  Google Scholar 

  29. Hutchinson, B.: Towards accountability for machine learning datasets: practices from software engineering and infrastructure. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency (FAccT 21) (2021)

    Google Scholar 

  30. Raji, I.D.: Closing the AI accountability gap: defining an end-to-end framework for internal algorithmic auditing. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency (2020)

    Google Scholar 

  31. Zoe, L.: Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing. Inf. Sci. 518 (2020)

    Google Scholar 

  32. Xingbo, D.: Open-set face identification with index-of-max hashing by learning. Pattern Recognit. 103 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sara Aboukadri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aboukadri, S., Ouaddah, A., Mezrioui, A. (2023). Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Identity and Access Management Field: Challenges and State of the Art. In: Hassanien, A.E., Snášel, V., Tang, M., Sung, TW., Chang, KC. (eds) Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics 2022. AISI 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 152. Springer, Cham. https://doi.org/10.1007/978-3-031-20601-6_5

Download citation

Publish with us

Policies and ethics