Skip to main content

Cost-Effective Modeling for Authentication and Its Application to Activity Tracker

  • Conference paper
Book cover Information Security Applications (WISA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9503))

Included in the following conference series:

Abstract

The growing popularity of multi-factor authentication, it makes the need for more cost-effective approach. The more authentication factors the system use, the higher cost for machine learning all of factors it require. We considered the behavioral authentication that is brought to attention as one of the authentication factors. The behavioral authentication works well with machine learning approaches. However, with machine learning, a model must be created, and the service provider must analyze each user individually; both adding to the cost. In this paper, we propose a cost-effective user modeling approach that uses a FuelBand to obtain activity information for behavioral authentication. This approach uses a clustering method that focuses on the characteristics of our behavioral authentication method. The performance of our system was compared to that of machine learning (70 users), and for no more than half the cost, the results had an accuracy of 89.28 %.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jakobsson, M., Shi, E., Golle, P., Chow, R.: Implicit authentication for mobile devices. In: Proceedings of the 4th USENIX Conference on Hot Topics in Security, p. 9. USENIX Association (2009)

    Google Scholar 

  2. Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smart phones. In: IEEE 11th International Conference on, Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1285–1292. IEEE (2012)

    Google Scholar 

  3. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367–397 (2002)

    Article  Google Scholar 

  4. Rong, L., Jianzhong, Z., Ming, L., Xiangfeng, H.: A wearable acceleration sensor system for gait recognition. In: 2nd IEEE Conference on Industrial Electronics and Applications, ICIEA 2007, pp. 2654–2659. IEEE (2007)

    Google Scholar 

  5. Hayashi, E., Das, S., Amini, S., Hong, J., Oakley, I.: Casa: context-aware scalable authentication. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 3. ACM (2013)

    Google Scholar 

  6. Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99–113. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  7. Khan, H., Hengartner, U.: Towards application-centric implicit authentication on smartphones. In: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, p. 10. ACM (2014)

    Google Scholar 

  8. Last account activity. https://support.google.com/mail/answer/45938?hl=en Google. Accessed 10 March 2015

  9. Riva, O., Qin, C., Strauss, K., Lymberopoulos, D.: Progressive authentication: deciding when to authenticate on mobile phones. In: USENIX Security Symposium, pp. 301–316 (2012)

    Google Scholar 

  10. Susuki, H., Yamaguchi, R.S.: Availability for user authentication by using user behavior of wearable devices (in japanese). In: The 32nd Symposium on Cryptography and Information Security (SCIS), p. 4C2-4 (2015)

    Google Scholar 

  11. Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4–20 (2004)

    Article  Google Scholar 

  12. Jain, A.K., Prabhakar, S., Hong, L.: A multichannel approach to fingerprint classification. IEEE Trans. Pattern Anal. Mach. Intell. 21(4), 348–359 (1999)

    Article  Google Scholar 

  13. Kale, A., Sundaresan, A., Rajagopalan, A.N., Cuntoor, N.P., Roy-Chowdhury, A.K., Kruger, V., Chellappa, R.: Identification of humans using gait. IEEE Trans. Image Process. 13(9), 1163–1173 (2004)

    Article  Google Scholar 

  14. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)

    Article  Google Scholar 

  15. Bottou, L., Cortes, C., Denker, J.S., Drucker, H., Guyon, I., Jackel, L.D., LeCun, Y., Muller, U.A., Sackinger, E., Simard, P., et al.: Comparison of classifier methods: a case study in handwritten digit recognition. In: International Conference on Pattern Recognition, p. 77. IEEE Computer Society Press (1994)

    Google Scholar 

  16. Weston, J., Watkins, C.: Multi-class support vector machines. Technical report, Citeseer (1998)

    Google Scholar 

  17. Hsu, C.-W., Lin, C.-J.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 13(2), 415–425 (2002)

    Article  Google Scholar 

  18. Guo, G., Li, S.Z., Chan, K.L.: Face recognition by support vector machines. In: Proceedings. Fourth IEEE International Conference on Automatic Face and Gesture Recognition, pp. 196–201. IEEE (2000)

    Google Scholar 

  19. Vapnik, V.: The Nature of Statistical Learning Theory. Springer Science & Business Media, New York (2000)

    Book  MATH  Google Scholar 

  20. Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8. ACM(2004)

    Google Scholar 

  21. Tefas, A., Kotropoulos, C., Pitas, I.: Using support vector machines to enhance the performance of elastic graph matching for frontal face authentication. IEEE Trans. Pattern Anal. Mach. Intell. 23(7), 735–746 (2001)

    Article  Google Scholar 

  22. Jonsson, K., Kittler, J., Li, Y.P., Matas, J.: Support vector machines for face authentication. Image Vis. Comput. 20(5), 369–375 (2002)

    Article  Google Scholar 

  23. Liu, Y., An, A., Huang, X.: Boosting prediction accuracy on imbalanced datasets with SVM ensembles. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol. 3918, pp. 107–118. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  24. Tian, M., Zhang, W., Liu, F.: On-line ensemble SVM for robust object tracking. In: Yagi, Y., Kang, S.B., Kweon, I.S., Zha, H. (eds.) ACCV 2007, Part I. LNCS, vol. 4843, pp. 355–364. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  25. Yu, L., Yue, W., Wang, S., Lai, K.K.: Support vector machine based multiagent ensemble learning for credit risk evaluation. Expert Syst. Appl. 37(2), 1351–1360 (2010)

    Article  Google Scholar 

  26. Fuelband apps. https://itunes.apple.com/en/app/nike+-fuel/id493325070?mt=8. Accessed 30 June 2015

  27. Fuelband. http://www.nike.com/us/en_us/c/nikeplus-fuel. Accessed 10 March 2015

  28. Chang, C.-C., Lin, C.-J.: LIBSVM: A library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27: 1–27: 27 (2011). http://www.csie.ntu.edu.tw/~cjlin/libsvm

    Google Scholar 

  29. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  30. R: The r project for statistical computing. http://www.r-project.org

Download references

Acknowledgments

We would like to thank Mitsubishi UFJ NICOS Co., Ltd. for a grant that made it possible to complete this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hiroya Susuki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Susuki, H., Yamaguchi, R.S. (2016). Cost-Effective Modeling for Authentication and Its Application to Activity Tracker. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31875-2_31

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31874-5

  • Online ISBN: 978-3-319-31875-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics