Controlling User Access to Cloud-Connected Mobile Applications by Means of Biometrics

Cloud-connected mobile applications are becoming a popular solution for ubiquitous access to online services, such as cloud data storage platforms. The adoption of such applications has brought security and privacy implications that are making individuals hesitant to migrate sensitive data to the Cloud; thus, new secure authentication protocols are needed. In this paper, we propose a continuous authentication approach integrating physical (face) and behavioral (touch and hand movements) biometrics to control user access to Cloud-based mobile services, going beyond one-off login. Experimental results show the security-usability tradeoff achieved by our approach.

[1]  Ning Zhang,et al.  A survey on touch dynamics authentication in mobile devices , 2016, Comput. Secur..

[2]  Carlos D. Castillo,et al.  Unconstrained Still/Video-Based Face Verification with Deep Convolutional Neural Networks , 2016, International Journal of Computer Vision.

[3]  Qing Yang,et al.  HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Kim-Kwang Raymond Choo,et al.  Biometrics in the Cloud: Challenges and Research Opportunities , 2017, IEEE Cloud Computing.

[5]  Mojtaba Alizadeh,et al.  Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..

[6]  Rama Chellappa,et al.  Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges , 2016, IEEE Signal Processing Magazine.

[7]  Matti Pietikäinen,et al.  Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.

[8]  Terrance E. Boult,et al.  Problems and Promises of Using the Cloud and Biometrics , 2014, 2014 11th International Conference on Information Technology: New Generations.

[9]  Yufei Chen,et al.  Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.

[10]  Soumik Mondal,et al.  Performance evaluation of continuous authentication systems , 2015, IET Biom..

[11]  W. Marsden I and J , 2012 .

[12]  Muttukrishnan Rajarajan,et al.  A continuous user authentication scheme for mobile devices , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).