SlideShare a Scribd company logo
1 of 11
Biometrics and Context
OUR TEAM
• Morgan Mayernik
• David Stroh
• Zach Moore
• Torrey Hutchison
Biometrics plus contextual
information is appropriate given
the performance requirements
in the workplace.
Location and habitual metrics
are currently the most useful for
the enterprise; however location
data is less invasive than
habitual data.
HYPOTHESIS
Key Takeaway: location and habit metrics
1
PROJECT OBJECTIVES
• How can context provide better biometrics usage?
• How should security and convenience be measured,
and how does a contextual system affect both
variables?
• How does each contextual metric contribute to
authenticating a user, and which are most effective
when combined together?
• How does privacy legislation and public opinion affect
the collection of contextual data?
Key Takeaway: There is a lot of big data that can build
context, and metrics should build upon one another
towards verifying a user’s identity.
CHALLENGES
• User acceptance of biometrics and privacy
concerns
• Contextual metrics are more invasive than
traditional methods of authentication
• Machine Learning may not be capable of
managing shifting multi-context situations
• Processing the massive amounts of contextual
data collected is overwhelming
• Current sensor technology and data collection
techniques may not be sufficiently accurate
2
LITERATURE REVIEW FINDINGS
(1)
• Who the user is
• What the user is requesting
• How the user is connected
• When the user is connecting
• Where the user is connecting from
• Why is the user connecting
(2)
Key Takeaway: A user’s
virtual identity is comprised
of a variety of factors
3,4,5
Our Solution
Device Attributes
1. GPS
2. Bluetooth
3. Camera
4. Gyroscope
5. Accelerometer
6. Microphone
DataType
Location
Movement
Noise
Light
Video
Insights
Identity
Locational
Temporal
Behavioral
Habitual
Social
EnvironmentalKey Takeaway: Combining multiple forms
of sensors and data will increase security
BENEFITS IN THE ENTERPRISE
• Integration between work calendars and authentication
• Dynamic security
• Increases understanding of employees’ workplace “identity”
based on habits and other contextual information
• Potential to use contextual data for other purposes, such as
office productivity
Key Takeaway: Continuous Authentication and
Contextual Data increases security for the Enterprise
6
NEXT STEPS
• Contextual data collection privacy best practices document
• Model the contextual data collection/analysis process
• Develop prototypes for using contextual information to
increase security
• Test contextual metrics for privacy, security, and entropy
• Examine the role IOT plays in contextual data
Key Takeaway: Privacy, IOT, Mobile, Big Data, Prototyping.
7
INTERNSHIP
•An internship this summer will allow more time to
explore the possibility of relating biometrics with
contextual metrics within IOT.
•We would also have the opportunity to move
beyond literature review into more polished testing.
•We would gain a better understanding of the
enterprise environment, and what contextual data
is most available for widespread usage.
REFERENCES
1. http://androidphonehub.com/huawei/test-huawei-p8-lite-lightweight-
version/attachment/huawei-p8-lite-gps-data/
2. http://www.fastcodesign.com/1672531/the-future-of-technology-isnt-mobile-its-
contextual
3. https://www.signup4.net/Upload/TERA10A/20142362E/3-T2-6-
Pacific%20Northwest%20National%20Laboratory-Pike.pdf
4. http://www.bytes.co.uk/files/7313/4383/1104/Gartner_Reprint-
_The_Future_of_Information_Security_is_Context_Aware_and_Adaptive.pdf
5. https://www.signup4.net/Upload/TERA10A/20142362E/3-T2-6-
Pacific%20Northwest%20National%20Laboratory-Pike.pdf
6. https://community.rackspace.com/general/f/34/t/1627
7. http://mitco.me/post/119582601970/age-of-context

More Related Content

What's hot

MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013Charith Perera
 
JAVA IEEE projects in network computing|| network projects 2014-2015 || final...
JAVA IEEE projects in network computing|| network projects 2014-2015 || final...JAVA IEEE projects in network computing|| network projects 2014-2015 || final...
JAVA IEEE projects in network computing|| network projects 2014-2015 || final...Cegonsoft Fames
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigANIL247048
 
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2016
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compuANIL247048
 
The MEASURE project : Measuring Software Engineering, Manrique Lopez, OW2con'...
The MEASURE project : Measuring Software Engineering, Manrique Lopez, OW2con'...The MEASURE project : Measuring Software Engineering, Manrique Lopez, OW2con'...
The MEASURE project : Measuring Software Engineering, Manrique Lopez, OW2con'...OW2
 
Blockchain in the context of IoT with a focus on monitoring: a survey 2017
Blockchain in the context of IoT with a focus on monitoring:  a survey 2017Blockchain in the context of IoT with a focus on monitoring:  a survey 2017
Blockchain in the context of IoT with a focus on monitoring: a survey 2017Ali Alzubaidi
 
Personalized Sensing System
Personalized Sensing SystemPersonalized Sensing System
Personalized Sensing SystemNobre Pedro
 

What's hot (8)

MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013
 
JAVA IEEE projects in network computing|| network projects 2014-2015 || final...
JAVA IEEE projects in network computing|| network projects 2014-2015 || final...JAVA IEEE projects in network computing|| network projects 2014-2015 || final...
JAVA IEEE projects in network computing|| network projects 2014-2015 || final...
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rig
 
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
 
The MEASURE project : Measuring Software Engineering, Manrique Lopez, OW2con'...
The MEASURE project : Measuring Software Engineering, Manrique Lopez, OW2con'...The MEASURE project : Measuring Software Engineering, Manrique Lopez, OW2con'...
The MEASURE project : Measuring Software Engineering, Manrique Lopez, OW2con'...
 
Blockchain in the context of IoT with a focus on monitoring: a survey 2017
Blockchain in the context of IoT with a focus on monitoring:  a survey 2017Blockchain in the context of IoT with a focus on monitoring:  a survey 2017
Blockchain in the context of IoT with a focus on monitoring: a survey 2017
 
Personalized Sensing System
Personalized Sensing SystemPersonalized Sensing System
Personalized Sensing System
 

Similar to Contextual Biometrics

44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
 
Irving-TeraData: data and science driven big industry-nfdp13
Irving-TeraData: data and science driven big industry-nfdp13Irving-TeraData: data and science driven big industry-nfdp13
Irving-TeraData: data and science driven big industry-nfdp13DataDryad
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...Aggregage
 
ASA conference Feb 2013
ASA conference Feb 2013ASA conference Feb 2013
ASA conference Feb 2013mrkwr
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
 
Technologies and Innovation – Ethics
Technologies and Innovation – EthicsTechnologies and Innovation – Ethics
Technologies and Innovation – EthicsLee Schlenker
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernanceCloudera, Inc.
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Integrated Marketing Analytics & Data-Driven Intelligence
Integrated Marketing Analytics & Data-Driven IntelligenceIntegrated Marketing Analytics & Data-Driven Intelligence
Integrated Marketing Analytics & Data-Driven IntelligenceVivastream
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxS .Ali Raza
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DevOps.com
 
I Series User Management
I Series User ManagementI Series User Management
I Series User ManagementSJeffrey23
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeUniversity of Geneva
 

Similar to Contextual Biometrics (20)

Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Irving-TeraData: data and science driven big industry-nfdp13
Irving-TeraData: data and science driven big industry-nfdp13Irving-TeraData: data and science driven big industry-nfdp13
Irving-TeraData: data and science driven big industry-nfdp13
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
ASA conference Feb 2013
ASA conference Feb 2013ASA conference Feb 2013
ASA conference Feb 2013
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Technologies and Innovation – Ethics
Technologies and Innovation – EthicsTechnologies and Innovation – Ethics
Technologies and Innovation – Ethics
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Integrated Marketing Analytics & Data-Driven Intelligence
Integrated Marketing Analytics & Data-Driven IntelligenceIntegrated Marketing Analytics & Data-Driven Intelligence
Integrated Marketing Analytics & Data-Driven Intelligence
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
 
I Series User Management
I Series User ManagementI Series User Management
I Series User Management
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 

Contextual Biometrics

  • 2. OUR TEAM • Morgan Mayernik • David Stroh • Zach Moore • Torrey Hutchison
  • 3. Biometrics plus contextual information is appropriate given the performance requirements in the workplace. Location and habitual metrics are currently the most useful for the enterprise; however location data is less invasive than habitual data. HYPOTHESIS Key Takeaway: location and habit metrics 1
  • 4. PROJECT OBJECTIVES • How can context provide better biometrics usage? • How should security and convenience be measured, and how does a contextual system affect both variables? • How does each contextual metric contribute to authenticating a user, and which are most effective when combined together? • How does privacy legislation and public opinion affect the collection of contextual data? Key Takeaway: There is a lot of big data that can build context, and metrics should build upon one another towards verifying a user’s identity.
  • 5. CHALLENGES • User acceptance of biometrics and privacy concerns • Contextual metrics are more invasive than traditional methods of authentication • Machine Learning may not be capable of managing shifting multi-context situations • Processing the massive amounts of contextual data collected is overwhelming • Current sensor technology and data collection techniques may not be sufficiently accurate 2
  • 6. LITERATURE REVIEW FINDINGS (1) • Who the user is • What the user is requesting • How the user is connected • When the user is connecting • Where the user is connecting from • Why is the user connecting (2) Key Takeaway: A user’s virtual identity is comprised of a variety of factors 3,4,5
  • 7. Our Solution Device Attributes 1. GPS 2. Bluetooth 3. Camera 4. Gyroscope 5. Accelerometer 6. Microphone DataType Location Movement Noise Light Video Insights Identity Locational Temporal Behavioral Habitual Social EnvironmentalKey Takeaway: Combining multiple forms of sensors and data will increase security
  • 8. BENEFITS IN THE ENTERPRISE • Integration between work calendars and authentication • Dynamic security • Increases understanding of employees’ workplace “identity” based on habits and other contextual information • Potential to use contextual data for other purposes, such as office productivity Key Takeaway: Continuous Authentication and Contextual Data increases security for the Enterprise 6
  • 9. NEXT STEPS • Contextual data collection privacy best practices document • Model the contextual data collection/analysis process • Develop prototypes for using contextual information to increase security • Test contextual metrics for privacy, security, and entropy • Examine the role IOT plays in contextual data Key Takeaway: Privacy, IOT, Mobile, Big Data, Prototyping. 7
  • 10. INTERNSHIP •An internship this summer will allow more time to explore the possibility of relating biometrics with contextual metrics within IOT. •We would also have the opportunity to move beyond literature review into more polished testing. •We would gain a better understanding of the enterprise environment, and what contextual data is most available for widespread usage.
  • 11. REFERENCES 1. http://androidphonehub.com/huawei/test-huawei-p8-lite-lightweight- version/attachment/huawei-p8-lite-gps-data/ 2. http://www.fastcodesign.com/1672531/the-future-of-technology-isnt-mobile-its- contextual 3. https://www.signup4.net/Upload/TERA10A/20142362E/3-T2-6- Pacific%20Northwest%20National%20Laboratory-Pike.pdf 4. http://www.bytes.co.uk/files/7313/4383/1104/Gartner_Reprint- _The_Future_of_Information_Security_is_Context_Aware_and_Adaptive.pdf 5. https://www.signup4.net/Upload/TERA10A/20142362E/3-T2-6- Pacific%20Northwest%20National%20Laboratory-Pike.pdf 6. https://community.rackspace.com/general/f/34/t/1627 7. http://mitco.me/post/119582601970/age-of-context