A SECURE FRAMEWORK TO BUILD FREQUENT AUTHENTICATION CHECKING SYSTEM FOR LONGER SESSIONS

Siramdas Narmada Devi, E. Ravi

Abstract


This paper explores the unit for continuous authentication of user using his credentials for example biometric traits. Typically, many of the systems originate from pairs of password which confirms the identity of user limited to login phase. Nowadays, it might be serious concern to supply more security to web services. So, secure user authentication may be the fundamental task in alarm systems. When the user is recognized with password, no inspections are moved out further during working sessions. But emerging biometric solutions substitutes the password with biometric data of user. Such approach still single shot verification is less capable since the identity of user is permanent during whole session. Hence, an easy solution is to use very small amount of time of timeouts for every session and periodically request the client to input his credentials again and again. This can be no effective solution since it heavily affects the service usability and lastly the satisfaction of clients. The usage of continuous biometric authentication system acquires credentials without clearly notifying the client or needing user interaction that's, transparently that's essential to guarantee better performance and repair usability.


Keywords


Web Security; Authentication; Continuous User Verification; Biometric Authentication

References


S. Ojala, J. Keinanen, and J. Skytta, “Wearable Authentication Device for Transparent Login in Nomadic Applications Environment,” Proc. Second Int’l Conf. Signals, Circuits and Systems (SCS ’08), pp. 1-6, Nov. 2008.

BioID “Biometric Authentication as a Service (BaaS),” BioID Press Release, https://www.bioid.com, Mar. 2011.

U. Uludag and A.K. Jain, “Attacks on Biometric Systems: A Case Study in Fingerprints,” Proc. SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622-633, 2004.

E. LeMay, W. Unkenholz, D. Parks, C. Muehrcke, K. Keefe, and W.H. Sanders, “Adversary-Driven State-Based System Security Evaluation,” Proc. the Sixth Int’l Workshop Security Measurements and Metrics (MetriSec ’10), pp. 5:1-5:9, 2010.

A.K. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Trans. Information Forensics and Security, vol. 1, no. 2, pp. 125-143, June 2006.

L. Allano, B. Dorizzi, and S. Garcia-Salicetti, “Tuning Cost and Performance in Multi-Biometric Systems: A Novel and Consistent View of Fusion Strategies Based on the Sequential Probability Ratio Test (SPRT),” Pattern Recognition Letters, vol. 31, no. 9, pp. 884-890, 2010.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.