4.6 Stop or Change the Service
For security measures, the SP is able to change of the
quality of service, such as by temporarily lowering
the maximum amount of money transferred or by re-
ducing the amount of credit that can be accessed. To
make the appropriate choice, the SP should use Ta-
bles 2. The SP must stop the service srvc if the ac-
cess probabilities of all scenarios are greater than k:
P
0
(Acc|S
l
(ID
u
j
, a)) > k for all S
l
. Also, the SP must
stop the service srvc if the usability probability of all
scenarios are greater than ub: P
0
(Acc|S
l
(ID
u
j
, u
j
)) >
ub for all S
l
.
5 CONCLUSIONS
This paper focuses on probabilistic framework for
multi-factor authentication. In recent years, the se-
curity environment has been changing rapidly due
to diversifying cracking methods and the improved
functionality of computers and mobile devices. We
discussed the need for evaluation methods that can
change the authentication factor dynamically, and
we proposed a probabilistic framework based on a
Bayesian model. Our research makes two contribu-
tions. First, we showed a probabilistic framework
for multi-factor authentication considering combina-
tion of authentication factors. Second, we showed a
theoretical model that is able to change authentica-
tion factors dynamically. Moreover, we proposed a
method for selecting a combination of authentication
factors for changing them when the security environ-
ment changes. Our framework can improve the se-
curity and usability of multi-factor authentication. In
the future, it is necessary to evaluate using actual case
studies and data.
ACKNOWLEDGEMENTS
We would like to thank Mitsubishi UFJ NICOS Co.,
Ltd. for a grant that made it possible to complete this
work.
REFERENCES
Al-Assam, H., Sellahewa, H., and Jassim, S. (2010). On
security of multi-factor biometric authentication. In
Internet Technology and Secured Transactions (IC-
ITST), 2010 International Conference for, pages 1–6.
IEEE.
Aloul, F., Zahidi, S., and El-Hajj, W. (2009). Multi fac-
tor authentication using mobile phones. Interna-
tional Journal of Mathematics and Computer Science,
4(2):65–80.
Bonneau, J., Herley, C., Van Oorschot, P. C., and Stajano,
F. (2012). The quest to replace passwords: A frame-
work for comparative evaluation of web authentica-
tion schemes. In Security and Privacy (SP), 2012
IEEE Symposium on, pages 553–567. IEEE.
Burr, W. E., Dodson, D. F., and Polk, W. T. (2004). Elec-
tronic authentication guideline. Citeseer.
Chen, L. and Crampton, J. (2012). Risk-aware role-based
access control. In Security and Trust Management,
pages 140–156. Springer.
Cheng, P. C., Rohatgi, P., Keser, C., Karger, P. A., Wagner,
G. M., and Reninger, A. S. (2007). Fuzzy multi-level
security: An experiment on quantified risk-adaptive
access control. In Security and Privacy, 2007. SP’07.
IEEE Symposium on, pages 222–230. IEEE.
Damer, N., Opel, A., and Nouak, A. (2014). Cmc curve
properties and biometric source weighting in multi-
biometric score-level fusion. In Information Fusion
(FUSION), 2014 17th International Conference on,
pages 1–6. IEEE.
Google (2015). Google 2-step verification [retrieved 18 sep.
2015]. https://www.google.com/landing/2step/.
Herley, C. (2009). So long, and no thanks for the externali-
ties: the rational rejection of security advice by users.
In Proceedings of the 2009 workshop on New security
paradigms workshop, pages 133–144. ACM.
Hocking, C. G., Furnell, S. M., Clarke, N. L., and Reynolds,
P. L. (2010). A distributed and cooperative user au-
thentication framework. In Information Assurance
and Security (IAS), 2010 Sixth International Confer-
ence on, pages 304–310. IEEE.
Karabacak, B. and Sogukpinar, I. (2005). Isram: informa-
tion security risk analysis method. Computers & Se-
curity, 24(2):147–159.
Kim, J.-J. and Hong, S.-P. (2011). A method of risk assess-
ment for multi-factor authentication. JIPS, 7(1):187–
198.
Kondakci, S. (2010). Network security risk assessment us-
ing bayesian belief networks. In Social Computing
(SocialCom), 2010 IEEE Second International Con-
ference on, pages 952–960. IEEE.
Nguyen, N. T., Zheng, G., Han, Z., and Zheng, R. (2011).
Device fingerprinting to enhance wireless security us-
ing nonparametric bayesian method. In INFOCOM,
2011 Proceedings IEEE, pages 1404–1412. IEEE.
Pavlovic, D. and Meadows, C. (2010). Bayesian authenti-
cation: Quantifying security of the hancke-kuhn pro-
tocol. Electronic Notes in Theoretical Computer Sci-
ence, 265:97–122.
Riva, O., Qin, C., Strauss, K., and Lymberopoulos, D.
(2012). Progressive authentication: Deciding when to
authenticate on mobile phones. In USENIX Security
Symposium, pages 301–316.
Sabzevar, A. P. and Stavrou, A. (2008). Universal multi-
factor authentication using graphical passwords. In
Signal Image Technology and Internet Based Systems,
ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy
280