Improve the Security and Usability of User Session using Continuous Authentication Protocol

M.V.Vinaya Nagini, CH Prasada Rao

Abstract


Session organization of distributed web applications is usually depends on textual passwords and biometric verification at the starting of session, but here single authentication is happening. In this the problem is client identity is not verifying during the whole session. To overcome this problem a new approach continuous authentication protocol and the architecture CASHMA (context aware security by hierarchical multilevel architecture) are proposed for user verification. The advantage of the proposed system is to increase usability and security of session with biometric data. Experimental studies have been implemented using java.


References


CASHMA-Context Aware Security by Hierarchical MultilevelArchitectures, MIUR FIRB, 2005.

U. Uludag and A.K. Jain, “Attacks on Biometric Systems: A Case Study in Fingerprints,” Proc. SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622-633,2004.

S. Ojala, J. Keinanen, and J. Skytta, “Wearable AuthenticationDevice for Transparent Login in Nomadic Applications Environment,”Proc. Second Int’l Conf. Signals, Circuits and Systems(SCS ’08), pp. 1-6, Nov. 2008.

A.K. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Trans. Informationm Forensics and Security, vol. 1, no. 2, pp. 125-143, June 2006.

T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, “ContinuousVerification Using Multimodal Biometrics,” IEEE Trans. PatternAnalysis and Machine Intelligence, vol. 29, no. 4, pp. 687-700, Apr.2007.

L. Montecchi, P. Lollini, A. Bondavalli, and E. La Mattina,“Quantitative Security Evaluation of a Multi-Biometric AuthenticationSystem,” Proc. Int’l Conf. Computer Safety, Reliability andSecurity, pp. 209-221, 2012.

S. Kumar, T. Sim, R. Janakiraman, and S. Zhang, “Using ContinuousBiometric Verification to Protect Interactive Login Sessions,”Proc. 21st Ann. Computer Security Applications Conf. (ACSAC ’05),pp. 441-450, 2005.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.