Keystroke dynamic authentication in mobile cloud computing

One of the important challenges in Mobile Cloud Computing (MCC) is related to the authentication of users. There is increasing demand for suitable authentication method for accessing to the shared information via the Internet through Cloud Service Provider (CSP). Personal identification number is th...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلفون الرئيسيون: Babaeizadeh, Mahnoush, Bakhtiari, Majid, Maarof, Mohd. Aizaini
التنسيق: مقال
منشور في: IJCA Foundation of Computer Science 2014
الموضوعات:
الوصول للمادة أونلاين:http://eprints.utm.my/id/eprint/59820/
http://dx.doi.org/10.5120/15541-4274
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
id my.utm.59820
record_format eprints
spelling my.utm.598202022-01-10T07:29:47Z http://eprints.utm.my/id/eprint/59820/ Keystroke dynamic authentication in mobile cloud computing Babaeizadeh, Mahnoush Bakhtiari, Majid Maarof, Mohd. Aizaini QA75 Electronic computers. Computer science One of the important challenges in Mobile Cloud Computing (MCC) is related to the authentication of users. There is increasing demand for suitable authentication method for accessing to the shared information via the Internet through Cloud Service Provider (CSP). Personal identification number is the most common mechanism for authentication in mobile devices; however it is not secure way for authenticating users. This work presents a method of authentication which able to identify users based on Keystroke Dynamic Authentication (KDA). Furthermore, keystrokes duration is considered as an attribute for measuring keystrokes of mobile’s users. This paper proposed strong method of authentication in the password authentication scheme by combining it with keystroke authentication, which is a type of behavioral biometric mechanism. Experimental results show, the proposed method can work 97.014% correctly, due to the keystroke duration of each user depends on their behavioral characteristic and it can be measured up to milliseconds. On the other hand, if unauthorized person knows the username and password of legal user can not gain access rights because of difference between their keystroke duration. Therefore, it is hard for an attacker to pretend as an owner, and this method enhances the security of authentication in MC. IJCA Foundation of Computer Science 2014-03 Article PeerReviewed Babaeizadeh, Mahnoush and Bakhtiari, Majid and Maarof, Mohd. Aizaini (2014) Keystroke dynamic authentication in mobile cloud computing. International Journal of Computer Applications, 90 (1). pp. 29-36. ISSN 0975-8887 http://dx.doi.org/10.5120/15541-4274 DOI:10.5120/15541-4274
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Babaeizadeh, Mahnoush
Bakhtiari, Majid
Maarof, Mohd. Aizaini
Keystroke dynamic authentication in mobile cloud computing
description One of the important challenges in Mobile Cloud Computing (MCC) is related to the authentication of users. There is increasing demand for suitable authentication method for accessing to the shared information via the Internet through Cloud Service Provider (CSP). Personal identification number is the most common mechanism for authentication in mobile devices; however it is not secure way for authenticating users. This work presents a method of authentication which able to identify users based on Keystroke Dynamic Authentication (KDA). Furthermore, keystrokes duration is considered as an attribute for measuring keystrokes of mobile’s users. This paper proposed strong method of authentication in the password authentication scheme by combining it with keystroke authentication, which is a type of behavioral biometric mechanism. Experimental results show, the proposed method can work 97.014% correctly, due to the keystroke duration of each user depends on their behavioral characteristic and it can be measured up to milliseconds. On the other hand, if unauthorized person knows the username and password of legal user can not gain access rights because of difference between their keystroke duration. Therefore, it is hard for an attacker to pretend as an owner, and this method enhances the security of authentication in MC.
format Article
author Babaeizadeh, Mahnoush
Bakhtiari, Majid
Maarof, Mohd. Aizaini
author_facet Babaeizadeh, Mahnoush
Bakhtiari, Majid
Maarof, Mohd. Aizaini
author_sort Babaeizadeh, Mahnoush
title Keystroke dynamic authentication in mobile cloud computing
title_short Keystroke dynamic authentication in mobile cloud computing
title_full Keystroke dynamic authentication in mobile cloud computing
title_fullStr Keystroke dynamic authentication in mobile cloud computing
title_full_unstemmed Keystroke dynamic authentication in mobile cloud computing
title_sort keystroke dynamic authentication in mobile cloud computing
publisher IJCA Foundation of Computer Science
publishDate 2014
url http://eprints.utm.my/id/eprint/59820/
http://dx.doi.org/10.5120/15541-4274
_version_ 1724073246496653312
score 13.154949