CARS-AD: a context-aware recommender system to decide about implicit or explicit authentication in ubihealth

Mobile devices using traditional authentication processes are vulnerable and inadequate. New approaches must be considered for solving this problem: environmental characteristics, device limitations and information obtained from sensors. This paper presents a recommendation system approach for information systems based on user behavior and information context in which the users are located. The recommendation system has been defined and deployed through filtering processes (content-based, collaborative and hybrid). The behavior is defined by the events and the actions that comprise the user activities. The experimental results indicate: (i) a more dynamic and autonomic mechanism for authenticating users in a pervasive mobile environment, and (ii) an efficiency improvement in detecting anomalies on authentication by using a similarity model and space-time permutation.

[1]  Carlos Delgado Kloos,et al.  A Collaborative Recommender System Based on Space-Time Similarities , 2010, IEEE Pervasive Computing.

[2]  Francesco Ricci,et al.  Acquiring and Revising Preferences in a Critique-Based Mobile Recommender System , 2007, IEEE Intelligent Systems.

[3]  Kenta Oku,et al.  A Recommendation System Considering Users' Past / Current / Future Contexts , 2010 .

[4]  Francesco Ricci,et al.  Mobile Recommender Systems , 2010, J. Inf. Technol. Tour..

[5]  David W. McDonald,et al.  Ubiquitous Recommendation Systems , 2003, Computer.

[6]  Anders Kofod-Petersen,et al.  Using Activity Theory to Model Context Awareness: A Qualitative Case Study , 2006, FLAIRS.

[7]  Gleneesha M. Johnson Towards shrink-wrapped security: A taxonomy of security-relevant context , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[8]  Robin D. Burke,et al.  Hybrid Web Recommender Systems , 2007, The Adaptive Web.

[9]  Tsan-sheng Hsu,et al.  Privacy-Preserving Collaborative Recommender Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[10]  Michael Anthony Bauer,et al.  A Context-Aware Authentication Approach Based on Behavioral Definitions , 2010, IKE.

[11]  Iara Augustin,et al.  ISAMadapt: abstractions and tools for designing general‐purpose pervasive applications , 2006, Softw. Pract. Exp..

[12]  M. A. R. Dantas,et al.  An authentication approach based on behavioral profiles , 2010, 5th Iberian Conference on Information Systems and Technologies.

[13]  Gerard Salton,et al.  Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer , 1989 .

[14]  Lorna Uden,et al.  Activity theory for designing mobile learning , 2007, Int. J. Mob. Learn. Organisation.

[15]  Changwoo Song,et al.  Secure and Efficient Recommendation Service of RFID System Using Authenticated Key Management , 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications.

[16]  Michael Roberts,et al.  Scalable architecture for context-aware activity-detecting mobile recommendation systems , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[17]  Jameela Al-Jaroodi,et al.  A Survey of Security Middleware for Pervasive and Ubiquitous Systems , 2009, 2009 International Conference on Network-Based Information Systems.

[18]  Adenauer Yamin,et al.  ISAMadapt: abstractions and tools for designing general-purpose pervasive applications: Experiences with Auto-adaptive and Reconfigurable Systems , 2006 .

[19]  Ambuj Mahanti,et al.  Strategies for Effective Shilling Attacks against Recommender Systems , 2009, PinKDD.

[20]  Debra J. Richardson,et al.  SRRS: a recommendation system for security requirements , 2008, RSSE '08.

[21]  Gabriele Anderst-Kotsis,et al.  Mobile recommendation systems for decision making 'on the go' , 2005, International Conference on Mobile Business (ICMB'05).

[22]  Anind K. Dey,et al.  Understanding and Using Context , 2001, Personal and Ubiquitous Computing.

[23]  Lior Rokach,et al.  Introduction to Recommender Systems Handbook , 2011, Recommender Systems Handbook.