Transparent User Authentication Using Biometric Traits for Secure Internet Services
Abstract
In this innovation time security of electronic applications is a genuine worry, because of the late increment in the recurrence and many-sided quality of digital assaults, biometric methods offer developing answer for secure and trusted client character check, where username and secret word are supplanted by bio-metric characteristics. Session administration in dispersed Internet administrations is customarily taking into account username and watchword, express logouts and systems of client session termination utilizing great timeouts. Rising biometric arrangements permit substituting username and secret key with biometric information amid session foundation, yet in such an approach still a solitary confirmation is regarded adequate, and the character of a client is viewed as changeless amid the whole session. Moreover, the length of the session timeout may affect on the ease of use of the administration and subsequent customer fulfillment. This paper investigates promising options offered by applying biometrics in the administration of sessions. A protected convention is characterized for ceaseless confirmation through persistent client check. The convention decides versatile timeouts in light of the quality, recurrence and kind of biometric information straightforwardly procured from the client. The practical conduct of the convention is delineated through Matlab recreations, while display based quantitative examination is done to evaluate the capacity of the convention to complexity security assaults practiced by various types of aggressors. At last, the present model for PCs and Android cell phones is talked about.
References
. CASHMA-“Context Aware Security by Hierarchical Multilevel Architecturesâ€, MIUR FIRB, 2005.
. Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, PaoloLollini, Angelo Marguglio, Andrea Bondavalli,, “Continuous and [3]. Transparent user identity verification for secure internet servicesâ€, IEEE Transactions on Dependable and Secure Computing MAY/JUNE 2015.
. L . Hong, A. Jain, and S. Pankanti, “Can Multibiometrics Improve Performance?†Proc. Workshop on Automatic Identification Advances Technologies (Auto ID ’99) Summit, pp. 59-64, 1999.
. [4] L. Montecchi, P. Lollini, A. Bondavalli, and E. La Mattina,“Quantitative Security Evaluation of a Multi-Biometric Authentication Systemâ€, Proc. Int’l Conf. Computer Safety, Reliability and security, pp. 209-221, 2012.
S.Sudarvizhi, S.Sumathi, “Review on continuous authentication using multi modal biometrics, International Journal of Emerging Technology and Advanced Engineeringâ€, Volume 3, Special Issue 1, January 2013.
D. M. Nicol, W. H. Sanders, K. S. Trivedi, “Model-based evaluation: from dependability to securityâ€, IEEE Trans. Dependable and Secure Computing, vol. 1 no. 1, pp. 4865, 2004.
N. Mendes, A.A. Neto, J. Duraes, M. Vieira, H. Madeira, “Assessing and comparing security of web serversâ€, IEEE International Symposiumon Dependable Computing (PRDC), pp. 313-322, 2008. [9] Anil K. Jain, Sharath Pankanti, Salil Prabhakar, Lin Hong, Arun Ross, James L. Wayman, “Biometrics: a grand challenge, Proceedings of International Conference on Pattern Recognitionâ€, Cambridge, UK, Aug.2004.
Sneha K. Patel, Dr. D. C. Joshi, “Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Humanâ€, IntJr. of Mathematics Sciences Applications, Vol.3, No.1, January-June2013.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â