The Abundant User Verification and Authentication for Ensured Internet Services

Machiraju Bhagya Sreelekha, Vuyyuru Vuyyuru Lakshma Reddy

Abstract


In These days, it turn out to be an open concern to give superior security to web services. In this way, secure user authentication is the principal assignment in security frameworks. Generally, the vast majority of the frameworks depend on sets of username and password which verifies the identity of user just at login stage. Once the user is related to username and password, no checks are performed encourage amid working sessions We investigate the nonstop user verification for the protected web services utilizing biometrics in the session service No checks are performed amid working sessions, which are terminated by an express logout or lapse after a sit action time of the user However a solitary verification step is still esteemed adequate, and the identity of a user is viewed as permanent amid the whole session. Also, the static length of the session timeout may effect on the ease of use of the service and ensuing customer fulfillment. This paper investigates promising choices offered by applying biometrics in the service of sessions. A safe convention is characterized for interminable authentication through persistent user verification. At last, the utilization of biometric authentication enables accreditations to be procured straightforwardly i.e. without unequivocally advising the user or requiring his association, which is basic to ensure better service ease of use.


Keywords


Web Security, user Continuous Authentication, Biometric Authentication, Web Services.

References


Andea ceccarelli, Leonardo Montechhi Francesco Brancati,Paolo Lollini,”Continuous and Transparent User Identity Verification for secure Internet Services”,IEEE transaction on dependable & secure computing Vol.12,No.3,May/June 2015

S.Z.Li and A.K.Jain,”Encylopedia f biometrics”First ed.,Springer 2009.

T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, “Continuous Verification Using Multimodal Biometrics,” IEEE Trans. Analysis and Machine Intelligence, vol. 29, no. 4, pp. 687-700, Apr. 2007

S. Kumar, T. Sim, R. Janakiraman, and S. Zhang, “Using Continuous Biometric Verification to Protect Interactive Login Sessions,”Proc. 21st Ann. Computer Security Applications Conf. (ACSAC ’05),pp. 441-450, 2005

A.Altinok and M.turk,”Temporal Integration for continuous Multimodal Biometrics,”Proc.workshop Multimodal User Authentication,pp.11-12,2003.

Lawrence O’Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication”, Proceedings of the IEEE, Vol. 91, No.12, Dec. 2003, pp. 2019-2040.

Arwa Alsultan and Kevin Warwick, “Keystroke Dynamics Authentication: A Survey of Free-text Methods”, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 4, No 1, July 2013.

Dwijen Rudrapal, Smita Das, S. Debbarma, N. kar, N. Debbarma, “Voice Recognition and Authentication as a Proficient Biometric Tool and its Application in Online Exam for P.H People”, International Journal of Computer Applications, Volume 39– No.12, February 2012.

S.Sudarvizhi, S.Sumathi, “Review on continuous authentication using multi modal biometrics, International Journal of Emerging Technology and Advanced Engineering”, Volume 3, Special Issue 1, January,2013.

D. M. Nicol, W. H. Sanders, K. S. Trivedi, “Model-based evaluation: from dependability to security”, IEEE Trans. Dependable and Secure Computing, vol. 1 no. 1, pp. 4865, 2004.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.