Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework

被引:14
作者
Gunn, Dylan J. [1 ]
Liu, Zhipeng [1 ]
Dave, Rushit [1 ]
Yuan, Xiaohong [1 ]
Roy, Kaushik [1 ]
机构
[1] NC A&T State Univ, Dept Comp Sci, Greensboro, NC 27401 USA
关键词
Active authentication; behavioral biometrics; touch pattern; distributed tensorflow; mobile cloud computing;
D O I
10.1142/S1469026819500226
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this modern world, mobile devices have been paired with the cloud environment to scale the voluminous amount of generated data. The implementation comes at the cost of privacy as proprietary data can be stolen in transit to the cloud, or victims' phones can be seized along with synced data from cloud. The attacker can gain access to the phone through shoulder surfing, or even spoofing attacks. Our approach is to mitigate this issue by proposing an active cloud authentication framework using touch biometric pattern. To the best of our knowledge, active cloud authentication using touch dynamics for mobile cloud computing has not been explored in the literature. This research creates a proof of concept that will lead into a simulated cloud framework for active authentication. Given the amount of data captured by the mobile device from user activity, it can be a computationally intensive process for the mobile device to handle with such limited resources. To solve this, we simulated a post-transmission process of data to the cloud so that we could implement the authentication process within the cloud. We evaluated the touch data using traditional machine learning algorithms, such as Random Forest (RF), Support Vector Machine (SVM), and also using a deep learning classifier, the Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) algorithms. The novelty of this work is twofold. First, we develop a distributed tensorflow framework for cloud authentication using touch biometric pattern. This framework helps alleviate the drawback of the computationally intensive recognition of the substantial amount of raw data from the user. Second, we apply the RF, SVM, and a deep learning classifier, the LSTM-RNN, on the touch data to evaluate the performance of the proposed authentication scheme. The proposed approach shows a promising performance with an accuracy of 99.0361% using RF on the distributed tensorflow framework.
引用
收藏
页数:16
相关论文
共 20 条
[1]  
Abadi M., 2015, P 12 USENIX S OPERAT
[2]  
Afonja Tejumade., 2017, Towards Data Science
[3]  
[Anonymous], 2016, Kapersky Lab Daily
[4]  
[Anonymous], 2017, WHAT ARE MEAN SQUARE
[5]  
[Anonymous], 2012, INT J SOFT COMPUT EN
[6]  
Aviv K. L., 2010, 4 USENIX WORKSHOP OF, V10, P1
[7]  
Biau G, 2012, J MACH LEARN RES, V13, P1063
[8]   A Framework for Secure Cloud-Empowered Mobile Biometrics [J].
Bommagani, Aruna Sri ;
Valenti, Matthew C. ;
Ross, Arun .
2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, :255-261
[9]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[10]  
Catak F. Ozgur, 2013, Pervasive Computing and the Networked World. Joint International Conference, ICPCA/SWS 2012. Revised Selected Papers, P57, DOI 10.1007/978-3-642-37015-1_6