Jigyasa Handa, Arjeeta Singh, A. Goyal, Parth Aggarwal
{"title":"连续认证的行为生物识别","authors":"Jigyasa Handa, Arjeeta Singh, A. Goyal, Parth Aggarwal","doi":"10.1109/PDGC.2018.8745880","DOIUrl":null,"url":null,"abstract":"Smartphones, tablets, laptops and PCs have brought across the revolution of always on, always connected. They have become ubiquitous in our lives. Smartphones and tablets combine and extend the functionality of feature phones and desktop computers. They give us an opportunity to play, work and socialize whenever and wherever we want. It has now become a standard and an everyday gadget. We use it for everything and thus it has the most private and sensitive information. It has become susceptible to a lot of privacy issues if it reaches the hand of an outsider. There exist a potential risks if our mobile phones get stolen or are ceased by an intruder. Mostly these devices have a one-step authentication process which consists of the initial login i.e. input of ID and password by the user to gain total access. But this doesn't take into consideration the situation of who accesses the device after the initial login. The detection of a fraudulent access isn't taken into consideration. To deal with this problem, continuous authentication is becoming quite popular in which the user is continuously monitored after the initial login authentication process is completed. This paper highlights the various continuous authentication methods which can be used to monitor our devices and analyze the current research, proposed framework and mechanisms that can be implemented or have already been implemented.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Behavioral Biometrics for Continuous Authentication\",\"authors\":\"Jigyasa Handa, Arjeeta Singh, A. Goyal, Parth Aggarwal\",\"doi\":\"10.1109/PDGC.2018.8745880\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Smartphones, tablets, laptops and PCs have brought across the revolution of always on, always connected. They have become ubiquitous in our lives. Smartphones and tablets combine and extend the functionality of feature phones and desktop computers. They give us an opportunity to play, work and socialize whenever and wherever we want. It has now become a standard and an everyday gadget. We use it for everything and thus it has the most private and sensitive information. It has become susceptible to a lot of privacy issues if it reaches the hand of an outsider. There exist a potential risks if our mobile phones get stolen or are ceased by an intruder. Mostly these devices have a one-step authentication process which consists of the initial login i.e. input of ID and password by the user to gain total access. But this doesn't take into consideration the situation of who accesses the device after the initial login. The detection of a fraudulent access isn't taken into consideration. To deal with this problem, continuous authentication is becoming quite popular in which the user is continuously monitored after the initial login authentication process is completed. This paper highlights the various continuous authentication methods which can be used to monitor our devices and analyze the current research, proposed framework and mechanisms that can be implemented or have already been implemented.\",\"PeriodicalId\":303401,\"journal\":{\"name\":\"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PDGC.2018.8745880\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDGC.2018.8745880","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Behavioral Biometrics for Continuous Authentication
Smartphones, tablets, laptops and PCs have brought across the revolution of always on, always connected. They have become ubiquitous in our lives. Smartphones and tablets combine and extend the functionality of feature phones and desktop computers. They give us an opportunity to play, work and socialize whenever and wherever we want. It has now become a standard and an everyday gadget. We use it for everything and thus it has the most private and sensitive information. It has become susceptible to a lot of privacy issues if it reaches the hand of an outsider. There exist a potential risks if our mobile phones get stolen or are ceased by an intruder. Mostly these devices have a one-step authentication process which consists of the initial login i.e. input of ID and password by the user to gain total access. But this doesn't take into consideration the situation of who accesses the device after the initial login. The detection of a fraudulent access isn't taken into consideration. To deal with this problem, continuous authentication is becoming quite popular in which the user is continuously monitored after the initial login authentication process is completed. This paper highlights the various continuous authentication methods which can be used to monitor our devices and analyze the current research, proposed framework and mechanisms that can be implemented or have already been implemented.