Transparent User Authentication Using Biometric Traits for Secure Internet Services

Keerthi Kaja, M.Chandra Sekhar

Abstract


In this innovation time security of electronic applications is a genuine worry, because of the late increment in the recurrence and many-sided quality of digital assaults, biometric methods offer developing answer for secure and trusted client character check, where username and secret word are supplanted by bio-metric characteristics. Session administration in dispersed Internet administrations is customarily taking into account username and watchword, express logouts and systems of client session termination utilizing great timeouts. Rising biometric arrangements permit substituting username and secret key with biometric information amid session foundation, yet in such an approach still a solitary confirmation is regarded adequate, and the character of a client is viewed as changeless amid the whole session. Moreover, the length of the session timeout may affect on the ease of use of the administration and subsequent customer fulfillment. This paper investigates promising options offered by applying biometrics in the administration of sessions. A protected convention is characterized for ceaseless confirmation through persistent client check. The convention decides versatile timeouts in light of the quality, recurrence and kind of biometric information straightforwardly procured from the client. The practical conduct of the convention is delineated through Matlab recreations, while display based quantitative examination is done to evaluate the capacity of the convention to complexity security assaults practiced by various types of aggressors. At last, the present model for PCs and Android cell phones is talked about.


References


. CASHMA-“Context Aware Security by Hierarchical Multilevel Architectures”, MIUR FIRB, 2005.

. Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, PaoloLollini, Angelo Marguglio, Andrea Bondavalli,, “Continuous and [3]. Transparent user identity verification for secure internet services”, IEEE Transactions on Dependable and Secure Computing MAY/JUNE 2015.

. L . Hong, A. Jain, and S. Pankanti, “Can Multibiometrics Improve Performance?” Proc. Workshop on Automatic Identification Advances Technologies (Auto ID ’99) Summit, pp. 59-64, 1999.

. [4] L. Montecchi, P. Lollini, A. Bondavalli, and E. La Mattina,“Quantitative Security Evaluation of a Multi-Biometric Authentication System”, Proc. Int’l Conf. Computer Safety, Reliability and security, pp. 209-221, 2012.

S.Sudarvizhi, S.Sumathi, “Review on continuous authentication using multi modal biometrics, International Journal of Emerging Technology and Advanced Engineering”, Volume 3, Special Issue 1, January 2013.

D. M. Nicol, W. H. Sanders, K. S. Trivedi, “Model-based evaluation: from dependability to security”, IEEE Trans. Dependable and Secure Computing, vol. 1 no. 1, pp. 4865, 2004.

N. Mendes, A.A. Neto, J. Duraes, M. Vieira, H. Madeira, “Assessing and comparing security of web servers”, IEEE International Symposiumon Dependable Computing (PRDC), pp. 313-322, 2008. [9] Anil K. Jain, Sharath Pankanti, Salil Prabhakar, Lin Hong, Arun Ross, James L. Wayman, “Biometrics: a grand challenge, Proceedings of International Conference on Pattern Recognition”, Cambridge, UK, Aug.2004.

Sneha K. Patel, Dr. D. C. Joshi, “Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human”, IntJr. of Mathematics Sciences Applications, Vol.3, No.1, January-June2013.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.