Innovative Data Authentication Model

Big data based user authentication is a new approach that leverages the power of the Big Data analytics to develop a fertile field for the next generation authentication protocols. This new approach relies on “something you do”-based verification methods, where the users' dynamic behaviors are analyzed in order to generate real-time uniquely identifiable information about them. Once the unique user's identification is generated “authentication on demand” can be achieved through user challenging questions that are dynamic and user specific. In this paper, the 3Vs nature of Big Data (volume, variety and velocity) is utilized to propose an Innovative Data Authentication Model (IDA). IDA model is a new implementation for the Big Data based user authentication in finding out unique patterns of the users' dynamic behaviors to be used as a basis for the user challenging questions generation process. In other words, Big Data analytic techniques such as association learning and behavioral classification will be used to compile the human dynamics into flexible security user profiles. The term “human dynamics” comprises the actions of human and their impacts on behavioral outcomes. The real-time analysis of these users' profiles helps generate a random set of challenging questions thereby “authentication on demand” feature is obtained. A practical use case scenario has been given to illustrate how IDA works from creating user profiles, to studying and classifying human dynamics and generating questionnaire with security potentials to authenticate users.

[1]  Hein S. Venter,et al.  Social engineering attack detection model: SEADM , 2010, 2010 Information Security for South Africa.

[2]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[3]  Jian Pei,et al.  Mining frequent patterns without candidate generation , 2000, SIGMOD '00.

[4]  Mark Merkow,et al.  Information Security: Principles and Practices , 2005 .

[5]  Mark Stamp,et al.  Information security - principles and practice , 2005 .

[6]  Ernesto Damiani,et al.  A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case , 2013, 2013 IEEE International Congress on Big Data.

[7]  Ray A. Perlner,et al.  Electronic Authentication Guideline , 2014 .

[8]  Abdelkader H. Ouda,et al.  A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks , 2015, J. Inf. Secur. Appl..

[9]  Abdelkader Ouda A framework for next generation user authentication , 2016, 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC).

[10]  Raheem A. Beyah,et al.  MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).