Emerging Session Management and Secured User Access Control for Internet services
Abstract
These days, it ends up open worry to give greater security to web services. Along these lines, secure user authentication is the central undertaking in security frameworks. Customarily, the greater part of the frameworks depend on sets of username and password which checks the character of user just at login stage. Once the user is related to username and password, no checks are performed promote amid working sessions. Yet, developing biometric arrangements substitutes the username and password with biometric data of user. In such approach still single shot check is less effective on the grounds that the personality of user is lasting amid entire session. Subsequently, an essential arrangement is to utilize brief time of timeouts for every session and intermittently ask for the user to enter his qualifications again and again. Be that as it may, this is anything but an appropriate arrangement since it intensely influences the administration ease of use and at last the fulfillment of users. This paper explores the framework for continuous authentication of user utilizing his qualifications, for example, biometric characteristics. The utilization of continuous biometric authentication framework gets accreditations without expressly advising the user or requiring user connection that is, transparently which is important to ensure better execution and administration ease of use.
Keywords
References
Andrea Ceccarelli, Leonardo Montecchi,, Continuous and Transparent User Identity Verification for Secure Internet Services IEEE, VOL. 12, NO. 3, MAY/JUNE 2015.
CASHMA-Context Aware Security by Hierarchical Multilevel Architectures, MIUR FIRB, 2005.
L. Hong, A. Jain, and S. Pankanti, “Can Multibiometrics Improve Performance?†Proc. Workshop on Automatic Identification Advances Technologies (AutoID ’99) Summit, pp. 59-64, 1999.
S. Ojala, J. Keinanen, and J. Skytta, “Wearable Authentication Device for Transparent Login in Nomadic Applications Environment,â€Proc. Second Int’l Conf. Signals, Circuits and Systems (SCS ’08), pp. 1-6, Nov. 2008.
BioID “Biometric Authentication as a Service (BaaS),†BioID Press Release, https://www.bioid.com, Mar. 2011
T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, “Continuous Verification Using Multimodal Biometrics,†IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 687-700, Apr.
Udayakumar R., Khanaa V., Saravanan T., Saritha G., "Retinal image analysis using curvelet transform and multistructure elements morphology by reconstruction", Middle - East Journal of Scientific Research, ISSN : 1990-9233, 16(12) (2013) pp.1781-1785.
CASHMA-Context Aware Security by Hierarchical Multilevel Architectures, MIUR FIRB, 2005.
C. Roberts, “Biometric Attack Vectors and Defences,†Computers & Security, vol. 26, no. 1, pp. 14-25, 2007.
S.Z. Li and A.K. Jain, Encyclopedia of Biometrics. first ed., Springer, 2009.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â