An efficient and secured approach for sequential and transparent identity validation of user in internet services

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    These days, it ends up noticeably genuine worry to give greater security to web administrations. Along these lines, secure client verification is the central assignment in security frameworks. Generally, a large portion of the frameworks depend on sets of username and secret key which checks the personality of client just at authentication stage. Once the client accesses with username and secret key, no checks are performed and encourages amid working sessions. Be that as it may, rising biometric arrangements gives the username and secret key using biometric information of client. In such approach, single shot check is less proficient in light of the fact that personality of client is perpetually amid entire session. Consequently, an important arrangement is to utilize brief time of timeouts for every session and occasionally ask the client to enter his or her qualifications again and again. In any case, this isn't a legitimate arrangement since it vigorously influences the administration convenience and eventually the fulfilment of clients. This paper investigates the framework for nonstop verification of client utilizing his accreditations, for example, biometric qualities. The utilization of consistent biometric verification framework procures certifications without expressly telling the client or requiring client communication that is, straightforwardly which is essential to ensure for better execution and administration ease of use.

     


  • Keywords


    Authentication; Biometric Authentication; Continuous User Verification; Web Security.

  • References


      [1] CASHMA-Context Aware Security by Hierarchical Multilevel Architectures, MIUR FIRB, 2005.

      [2] Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, Paolo Lollini, Angelo Marguglio, Andrea Bondavalli ”Continuous and Transparent User Identity Verification for Secure Internet Services” IEEE Transaction on De-pendable and Secure Computing, VOL. 12,NO. 3, JUNE 2015. http://www.ijtra.com/view/continuous-and-transparent-user-identity-verification-for-secure-internet-services.pdf

      [3] Anil K. Jain, SharathPankanti, SalilPrabhakar, Lin Hong, Arun Ross, James L. Wayman,”Biometrics: A Grand Challenge” International Conference on Pattern Recognition, Aug 2004. http://biometrics.cse.msu.edu/Publications/GeneralBiometrics/Jainetal_BiometricsGrandChallenge_ICPR04.pdf

      [4] T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, “Continuous Verification Using Multimodal Biometrics,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 687-700, Apr. 2007. https://pdfs.semanticscholar.org/b6eb/44fbd7de0a7637b0aaccf0bb462c12d19e67.pdf

      [5] T.F. Dapp, “Growing Need for Security in Online Banking: Biometrics Enjoy Remarkable Degree of Acceptance,,” Banking & Technology Snapshot, DB Research, Feb. 2012. http://www.ijrter.com/papers/volume-2/issue-8/continuous-user-authentication-using-cashma-system.pdf

      [6] A. Ceccarelli, A. Bondavalli, F. Brancati, and E. La Mattina, “Improving Security of Internet Services through Continuous and Transparent User Identity Verification,” Proc. Int’l Symp. Reliable Distributed Systems (SRDS), pp. 201-206, Oct. 2012.

      [7] L. Montecchi, P. Lollini, A. Bondavalli, and E. La Mattina, “Quantitative Security Evaluation of a Multi-Biometric Authentication System,” Proc. Int’l Conf. Computer Safety, Reliability and Security, pp. 209-221, 2012.

      [8] S. Kumar, T. Sim, R. Janakiraman, and S. Zhang, “Using Continuous Biometric Verification to Protect Interactive Login Sessions,” Proc. 21st Ann. Computer Security Applications Conf. (ACSAC ’05), pp. 441-450, 2005. http://ijarcsse.com/Before_August_2017/docs/papers/Volume_6/9_September2016/V6I9-0141.pdf.

      [9] Biometric System Base Secure Authentication Service for Session Management NilimaDeore, Prof.C.R.Barde International Journal of Innovative Research in Computer and Communication Engineering Vol. 3, Issue 12, December 2015.


 

View

Download

Article ID: 10823
 
DOI: 10.14419/ijet.v7i1.1.10823




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.