Abstract
The growing popularity of multi-factor authentication, it makes the need for more cost-effective approach. The more authentication factors the system use, the higher cost for machine learning all of factors it require. We considered the behavioral authentication that is brought to attention as one of the authentication factors. The behavioral authentication works well with machine learning approaches. However, with machine learning, a model must be created, and the service provider must analyze each user individually; both adding to the cost. In this paper, we propose a cost-effective user modeling approach that uses a FuelBand to obtain activity information for behavioral authentication. This approach uses a clustering method that focuses on the characteristics of our behavioral authentication method. The performance of our system was compared to that of machine learning (70 users), and for no more than half the cost, the results had an accuracy of 89.28 %.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jakobsson, M., Shi, E., Golle, P., Chow, R.: Implicit authentication for mobile devices. In: Proceedings of the 4th USENIX Conference on Hot Topics in Security, p. 9. USENIX Association (2009)
Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smart phones. In: IEEE 11th International Conference on, Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1285–1292. IEEE (2012)
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367–397 (2002)
Rong, L., Jianzhong, Z., Ming, L., Xiangfeng, H.: A wearable acceleration sensor system for gait recognition. In: 2nd IEEE Conference on Industrial Electronics and Applications, ICIEA 2007, pp. 2654–2659. IEEE (2007)
Hayashi, E., Das, S., Amini, S., Hong, J., Oakley, I.: Casa: context-aware scalable authentication. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 3. ACM (2013)
Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99–113. Springer, Heidelberg (2011)
Khan, H., Hengartner, U.: Towards application-centric implicit authentication on smartphones. In: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, p. 10. ACM (2014)
Last account activity. https://support.google.com/mail/answer/45938?hl=en Google. Accessed 10 March 2015
Riva, O., Qin, C., Strauss, K., Lymberopoulos, D.: Progressive authentication: deciding when to authenticate on mobile phones. In: USENIX Security Symposium, pp. 301–316 (2012)
Susuki, H., Yamaguchi, R.S.: Availability for user authentication by using user behavior of wearable devices (in japanese). In: The 32nd Symposium on Cryptography and Information Security (SCIS), p. 4C2-4 (2015)
Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4–20 (2004)
Jain, A.K., Prabhakar, S., Hong, L.: A multichannel approach to fingerprint classification. IEEE Trans. Pattern Anal. Mach. Intell. 21(4), 348–359 (1999)
Kale, A., Sundaresan, A., Rajagopalan, A.N., Cuntoor, N.P., Roy-Chowdhury, A.K., Kruger, V., Chellappa, R.: Identification of humans using gait. IEEE Trans. Image Process. 13(9), 1163–1173 (2004)
Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)
Bottou, L., Cortes, C., Denker, J.S., Drucker, H., Guyon, I., Jackel, L.D., LeCun, Y., Muller, U.A., Sackinger, E., Simard, P., et al.: Comparison of classifier methods: a case study in handwritten digit recognition. In: International Conference on Pattern Recognition, p. 77. IEEE Computer Society Press (1994)
Weston, J., Watkins, C.: Multi-class support vector machines. Technical report, Citeseer (1998)
Hsu, C.-W., Lin, C.-J.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 13(2), 415–425 (2002)
Guo, G., Li, S.Z., Chan, K.L.: Face recognition by support vector machines. In: Proceedings. Fourth IEEE International Conference on Automatic Face and Gesture Recognition, pp. 196–201. IEEE (2000)
Vapnik, V.: The Nature of Statistical Learning Theory. Springer Science & Business Media, New York (2000)
Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8. ACM(2004)
Tefas, A., Kotropoulos, C., Pitas, I.: Using support vector machines to enhance the performance of elastic graph matching for frontal face authentication. IEEE Trans. Pattern Anal. Mach. Intell. 23(7), 735–746 (2001)
Jonsson, K., Kittler, J., Li, Y.P., Matas, J.: Support vector machines for face authentication. Image Vis. Comput. 20(5), 369–375 (2002)
Liu, Y., An, A., Huang, X.: Boosting prediction accuracy on imbalanced datasets with SVM ensembles. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol. 3918, pp. 107–118. Springer, Heidelberg (2006)
Tian, M., Zhang, W., Liu, F.: On-line ensemble SVM for robust object tracking. In: Yagi, Y., Kang, S.B., Kweon, I.S., Zha, H. (eds.) ACCV 2007, Part I. LNCS, vol. 4843, pp. 355–364. Springer, Heidelberg (2007)
Yu, L., Yue, W., Wang, S., Lai, K.K.: Support vector machine based multiagent ensemble learning for credit risk evaluation. Expert Syst. Appl. 37(2), 1351–1360 (2010)
Fuelband apps. https://itunes.apple.com/en/app/nike+-fuel/id493325070?mt=8. Accessed 30 June 2015
Fuelband. http://www.nike.com/us/en_us/c/nikeplus-fuel. Accessed 10 March 2015
Chang, C.-C., Lin, C.-J.: LIBSVM: A library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27: 1–27: 27 (2011). http://www.csie.ntu.edu.tw/~cjlin/libsvm
Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)
R: The r project for statistical computing. http://www.r-project.org
Acknowledgments
We would like to thank Mitsubishi UFJ NICOS Co., Ltd. for a grant that made it possible to complete this work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Susuki, H., Yamaguchi, R.S. (2016). Cost-Effective Modeling for Authentication and Its Application to Activity Tracker. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-31875-2_31
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31874-5
Online ISBN: 978-3-319-31875-2
eBook Packages: Computer ScienceComputer Science (R0)