Abstract
In order to meet the higher security requirements of authentication technology under the current mobile Internet background, continuous identity authentication technology based on single authentication improvement came into being. At present, continuous authentication technology has problems such as low security, low efficiency, and lack of a scientific punishment mechanism. How to efficiently, safely and comprehensively evaluate the legal and illegal requests of the terminal is a huge challenge for continuous authentication. The multi-device continuous authentication mechanism based on homomorphic encryption and SVM algorithm can satisfy the server in a sufficiently secure environment to enable the terminal request to be continuously authenticated. Moreover, based on the existing research, this paper designs a new penalty protocol and applies it to the continuous authentication mechanism. For this purpose, an illegal request processing model is constructed, and the penalty protocol designed to cope with the illegal request Further processing solves the problem that the existing continuous authentication mechanism is insufficient to handle illegal requests and is not humane enough. Finally, the experimental results of SVM and convolutional network on a single device and multiple devices are compared from three dimensions. The comparison of the experimental results verifies the effectiveness of the proposed model and protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gomi, H., Yamaguchi, S., Tsubouchi, K., Sasaya, N.: Continuous authentication system us- ing online activities. In: 2018 17th IEEE International Conference on Trust, Security and Privacy; in Computing and Communications/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), pp. 522–532 (2018)
Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous user authentication on mobile devices: Recent progress and remaining challenges. IEEE Signal Process. Mag. 33(4), 49–61 (2016)
Song, X., Zhao, P., Wang, M., Yan, C.: A continuous identity verification method based on free-text keystroke dynamics. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary, pp. 000206–000210 (2016)
Messerman, A., Mustafic´, T., Camtepe, S.A., Albayrak, S.: Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In: 2011 International Joint Conference on Biometrics (IJCB), Washington, DC, USA, pp. 1–8 (2011)
Hernández-Álvarez, L., Fuentes, J.M.D., González-Manzano, L., Encinas, L.H.: SmartCAMPP-Smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Pattern Recogn. Lett. 147, 189–196 (2021)
Sánchez, P.M.S., Maimó, L.F., Celdrán, A.H., Pérez, G.M.: AuthCODE: A privacy- preserving and multi-device continuous authentication architecture based on machine and deep learning. Comput. Secur. 103, 102168 (2021)
Abuhamad, M., Abuhmed, T., Mohaisen, D., Nyang, D.: AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet Things J. 7(6), 5008–5020 (2020)
Kluczniak, K., Wang, J., Chen, X., Kutyłowski, M.: Multi-device anonymous authentication. Int. J. Inf. Secur. 18(2), 181–197 (2018). https://doi.org/10.1007/s10207-018-0406-4
Samet, S., Ishraque, M.T., Ghadamyari, M., Kakadiya, K., Mistry, Y., Nakkabi, Y.: TouchMetric: a machine learning based continuous authentication feature testing mobile application. Int. J. Inf. Technol. 11(4), 625–631 (2019). https://doi.org/10.1007/s41870-019-00306-w
Al-Naji, F.H., Zagrouba, R.: A survey on continuous authentication methods in Internet of Things environment. Comput. Commun. 163, 109–133 (2020)
Udandarao, V., Agrawal, M., Kumar, R., Shah, R.R.: On the Inference of Soft Biometrics from Typing Patterns Collected in a Multi-device Environment. In: IEEE Sixth International Conference on Multimedia Big Data (BigMM), New Delhi, India, pp. 76–85 (2020)
Gomi, H., Yamaguchi, S., Ogami, W., Teraoka, T., Higurashi, T.: Context-Aware Authentica- tion Using Co-Located Devices. In: 18th IEEE International Conference on Trust, Security and Privacy; In: Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, Rotorua, New Zealand, pp. 304–311 (2019)
Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings CCSW, pp. 113–124 (2011)
Ceccarelli, A., Montecchi, L., Brancati, F., Lollini, P., Marguglio, A.: Continuous and trans- parent user identity verification for secure internet services. IEEE Transactions on Depend- able and Secure Computing 12(3), 270–283 (2014)
Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. Int. J. Man Mach. Stud. 35(6), 859–870 (1991)
Khan, A.A., Khan, F.A.: A cost-efficient radiation monitoring system for nuclear sites: de- signing and implementation. Intelligent Automation & Soft Computing 32(3), 1357–1367 (2022)
Shao, X.: Accurate multi-site daily-ahead multi-step pm2.5 concentrations forecasting using space-shared cnn-lstm. Computers, Materials & Continua 70(3), 5143–5160 (2022)
Malavika, R., Valarmathi, M.L.: Adaptive server load balancing in sdn using pid neural net- work controller. Comput. Syst. Sci. Eng. 42(1), 229–243 (2022)
Alrajhi, H.: A generalized state space average model for parallel dc-to-dc converters. Com- puter Systems Science and Engineering 41(2), 717–734 (2022)
Ju, X.: An Overview of Face Manipulation Detection. Journal of Cyber Security 2(4), 197–207 (2020)
Acknowledgement
This work is supported by the State Grid Sichuan Company Science and Technology Project: “Research and Application of Key Technologies of Network Security Protection System Based on Zero Trust Model” (No. SGSCCD00XTJS2101279).
Funding
The authors declare that they have no conflicts of interest to report regarding the present study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Gan, W. et al. (2022). Multi-device Continuous Authentication Mechanism Based on Homomorphic Encryption and SVM Algorithm. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_49
Download citation
DOI: https://doi.org/10.1007/978-3-031-06791-4_49
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06790-7
Online ISBN: 978-3-031-06791-4
eBook Packages: Computer ScienceComputer Science (R0)