Keystroke dynamic authentication in mobile cloud computing
One of the important challenges in Mobile Cloud Computing (MCC) is related to the authentication of users. There is increasing demand for suitable authentication method for accessing to the shared information via the Internet through Cloud Service Provider (CSP). Personal identification number is th...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
IJCA Foundation of Computer Science
2014
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/59820/ http://dx.doi.org/10.5120/15541-4274 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.59820 |
---|---|
record_format |
eprints |
spelling |
my.utm.598202022-01-10T07:29:47Z http://eprints.utm.my/id/eprint/59820/ Keystroke dynamic authentication in mobile cloud computing Babaeizadeh, Mahnoush Bakhtiari, Majid Maarof, Mohd. Aizaini QA75 Electronic computers. Computer science One of the important challenges in Mobile Cloud Computing (MCC) is related to the authentication of users. There is increasing demand for suitable authentication method for accessing to the shared information via the Internet through Cloud Service Provider (CSP). Personal identification number is the most common mechanism for authentication in mobile devices; however it is not secure way for authenticating users. This work presents a method of authentication which able to identify users based on Keystroke Dynamic Authentication (KDA). Furthermore, keystrokes duration is considered as an attribute for measuring keystrokes of mobile’s users. This paper proposed strong method of authentication in the password authentication scheme by combining it with keystroke authentication, which is a type of behavioral biometric mechanism. Experimental results show, the proposed method can work 97.014% correctly, due to the keystroke duration of each user depends on their behavioral characteristic and it can be measured up to milliseconds. On the other hand, if unauthorized person knows the username and password of legal user can not gain access rights because of difference between their keystroke duration. Therefore, it is hard for an attacker to pretend as an owner, and this method enhances the security of authentication in MC. IJCA Foundation of Computer Science 2014-03 Article PeerReviewed Babaeizadeh, Mahnoush and Bakhtiari, Majid and Maarof, Mohd. Aizaini (2014) Keystroke dynamic authentication in mobile cloud computing. International Journal of Computer Applications, 90 (1). pp. 29-36. ISSN 0975-8887 http://dx.doi.org/10.5120/15541-4274 DOI:10.5120/15541-4274 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Babaeizadeh, Mahnoush Bakhtiari, Majid Maarof, Mohd. Aizaini Keystroke dynamic authentication in mobile cloud computing |
description |
One of the important challenges in Mobile Cloud Computing (MCC) is related to the authentication of users. There is increasing demand for suitable authentication method for accessing to the shared information via the Internet through Cloud Service Provider (CSP). Personal identification number is the most common mechanism for authentication in mobile devices; however it is not secure way for authenticating users. This work presents a method of authentication which able to identify users based on Keystroke Dynamic Authentication (KDA). Furthermore, keystrokes duration is considered as an attribute for measuring keystrokes of mobile’s users. This paper proposed strong method of authentication in the password authentication scheme by combining it with keystroke authentication, which is a type of behavioral biometric mechanism. Experimental results show, the proposed method can work 97.014% correctly, due to the keystroke duration of each user depends on their behavioral characteristic and it can be measured up to milliseconds. On the other hand, if unauthorized person knows the username and password of legal user can not gain access rights because of difference between their keystroke duration. Therefore, it is hard for an attacker to pretend as an owner, and this method enhances the security of authentication in MC. |
format |
Article |
author |
Babaeizadeh, Mahnoush Bakhtiari, Majid Maarof, Mohd. Aizaini |
author_facet |
Babaeizadeh, Mahnoush Bakhtiari, Majid Maarof, Mohd. Aizaini |
author_sort |
Babaeizadeh, Mahnoush |
title |
Keystroke dynamic authentication in mobile cloud computing |
title_short |
Keystroke dynamic authentication in mobile cloud computing |
title_full |
Keystroke dynamic authentication in mobile cloud computing |
title_fullStr |
Keystroke dynamic authentication in mobile cloud computing |
title_full_unstemmed |
Keystroke dynamic authentication in mobile cloud computing |
title_sort |
keystroke dynamic authentication in mobile cloud computing |
publisher |
IJCA Foundation of Computer Science |
publishDate |
2014 |
url |
http://eprints.utm.my/id/eprint/59820/ http://dx.doi.org/10.5120/15541-4274 |
_version_ |
1724073246496653312 |
score |
13.211869 |