Biometric data on the edge for secure, smart and user tailored access to cloud services

被引:11
作者
Barra, Silvio [1 ]
Castiglione, Aniello [2 ]
Narducci, Fabio [2 ]
De Marsico, Maria [3 ]
Nappi, Michele [4 ]
机构
[1] Univ Cagliari, Dept Math & Comp Sci, Cagliari, Italy
[2] Univ Naples Parthenope, Dept Sci & Technol, Naples, Italy
[3] Sapienza Univ Rome, Rome, Italy
[4] Univ Salerno, Dept Comp Sci, Salerno, Italy
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 101卷
关键词
Edge Computing; Mobile Computing; IoT; Biometric Recognition; Context Awareness; RECOGNITION; SYSTEMS;
D O I
10.1016/j.future.2019.06.019
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We are living an era in which each of us is immersed in a fully connected environment. The smart devices worn everyday by everyone let the users be projected into the so called IoT world, whose main aim is to provide tools and strategies to solve problems of everyday life as well as to improve well-being and quality of life. Such a goal can be achieved in several ways, but consumer specific services should be provided according to their daily habits, as well as temporary needs. This can be made possible by current mobile devices and their built-in sensors, which can infer the context where the owner operates and the performed activities to build up a user profile. In this work, an architecture for cloud services supply is proposed, based on subject continuous authentication and context (status/activity) recognition. A subject and the context are authenticated/recognised by means of the cyclic recognition of signals captured by the sensors of his/her smartphone, e.g., accelerometer and gyroscope. In order to test the accuracy of the proposed context recognition, the H-MOG dataset has been used, which provides joint acquisitions of status data (Sitting or Walking) related to the activity performed (Reading, Writing, or Navigating Map). (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:534 / 541
页数:8
相关论文
共 30 条
[21]   Implicit human computer interaction through context [J].
Albrecht Schmidt .
Personal Technologies, 2000, 4 (2-3) :191-199
[22]   HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users [J].
Sitova, Zdenka ;
Sedenka, Jaroslav ;
Yang, Qing ;
Peng, Ge ;
Zhou, Gang ;
Gasti, Paolo ;
Balagani, Kiran S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) :877-892
[23]  
Talreja V., 2018, 2018 IEEE International Conference on Consumer Electronics (ICCE), P1
[24]   Interconnected Cloud Computing Environments: Challenges, Taxonomy, and Survey [J].
Toosi, Adel Nadjaran ;
Calheiros, Rodrigo N. ;
Buyya, Rajkumar .
ACM COMPUTING SURVEYS, 2014, 47 (01)
[25]   Scene-Specific Pedestrian Detection for Static Video Surveillance [J].
Wang, Xiaogang ;
Wang, Meng ;
Li, Wei .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2014, 36 (02) :361-374
[26]   TruGRC: Trust-Aware Group Recommendation with Virtual Coordinators [J].
Wang, Ximeng ;
Liu, Yun ;
Lu, Jie ;
Xiong, Fei ;
Zhang, Guangquan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 94 :224-236
[27]   Coarse to fine K nearest neighbor classifier [J].
Xu, Yong ;
Zhu, Qi ;
Fan, Zizhu ;
Qiu, Minna ;
Chen, Yan ;
Liu, Hong .
PATTERN RECOGNITION LETTERS, 2013, 34 (09) :980-986
[28]  
Yang Q., 2014, P 12 ACM COM EMB NET, P358, DOI 10.1145/2668332.2668366
[29]   A linear discriminant analysis framework based on random subspace for face recognition [J].
Zhang, Xiaoxun ;
Jia, Yunde .
PATTERN RECOGNITION, 2007, 40 (09) :2585-2591
[30]   PassBio: Privacy-Preserving User-Centric Biometric Authentication [J].
Zhou, Kai ;
Ren, Jian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (12) :3050-3063