Skip to main content

Improvised Classification Model for Cloud Based Authentication Using Keystroke Dynamics

  • Conference paper
Future Information Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 309))

  • 2139 Accesses

Abstract

The etymology of communication is the transmission of data. Data has to be transmitted through different devices, network topologies and geographic locations. The strength of communication has tripled with the advent of cloud technologies providing high scalability and storage on demand. The need for cloud security is increasing in an alarming rate and using biometric techniques over traditional password based alternative has proved to be efficient. A behavioral biometric such as keystroke dynamics can be used to strengthen existing security techniques effectively .Due to the semi-autonomous nature of the typing behavior of an individual it is difficult to validate the identity of the user. This paper proposes a model to validate the identity of the user which acclimatizes to tolerance across multiple devices and provides a robust three dimensional model for classification. As an additional layer of security the model is transformed after every login to prevent professional intruders from predicting the acceptance region.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Kumar, S.T., Priyanka, U.S., Abinaya, K.: Article: Towards an Approach for Improved Security in Wireless Networks. In: IJCA Proceedings on International Conference on Innovation in Communication, Information and Computing, ICICIC 2013, vol. (1), pp. 23–27. Foundation of Computer Science, New York (2013)

    Google Scholar 

  2. Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security (TISSEC) 3(3), 186–205 (2000)

    Article  MathSciNet  Google Scholar 

  3. Ashbourn, J.: Biometrics: advanced identity verification. Springer (2000)

    Google Scholar 

  4. Adler, A., Youmaran, R., Loyka, S.: Information content of biometric features. In: Biometrics Consortium Conference (2005)

    Google Scholar 

  5. Ilonen, J.: Keystroke dynamics. Advanced Topics in Information Processing–Lecture (2003); 03-04

    Google Scholar 

  6. Kanade, S., et al.: Application of biometrics to obtain high entropy cryptographic keys. World Acad. Sci. Eng.Tech. 52 (2009)

    Google Scholar 

  7. Adler, A., Youmaran, R., Loyka, S.: Towards a measure of biometric feature information. Pattern Analysis and Applications 12(3), 261–270 (2009)

    Article  MathSciNet  Google Scholar 

  8. Uludag, U., et al.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

  9. Li, Y., et al.: Study on the BeiHang keystroke dynamics database. In: 2011 International Joint Conference on Biometrics (IJCB). IEEE (2011)

    Google Scholar 

  10. Rudrapal, D., et al.: Attacker Detection by Analyzing User Keystroke Credential. Lecture Notes on Software Engineering 1(1) (2013)

    Google Scholar 

  11. Chang, T.-Y., et al.: User Authentication Using Rhythm Click Characteristics for Non-Keyboard Devices. In: Proc. of the 2011 International Conference on Asia Agriculture and Animal, IPCBEE (2011)

    Google Scholar 

  12. Teh, P.S., Yue, S., Teoh, A.B.J.: Feature Fusion Approach on Keystroke Dynamics Efficiency Enhancement. International Journal of CyberSecurity and Digital Forensics (IJCSDF) 1(1), 20–31 (2012)

    Google Scholar 

  13. Banerjee, S.P.: Biometric authentication and identification using keystroke dynamics: A survey. ournal of Pattern Recognition Research 7, 116–139 (2012)

    Article  Google Scholar 

  14. Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: Approaches, security and challenges. arXiv preprint arXiv:0910.0817 (2009)

    Google Scholar 

  15. Mandujano, S., Soto, R.: Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data. In: Proceedings of the Fifth Mexican International Conference in IEEE Computer Science, ENC 2004 (2004)

    Google Scholar 

  16. Boechat, G.C., Ferreira, J.C., Carvalho, E.C.B.: Using the keystrokes dynamic for systems of personal security. Transactions on Engineering, Computing and Technology. Enformatika 18(1), 200–205 (2006)

    Google Scholar 

  17. Johansen, U.A.: Keystroke Dynamics on a Device with Touch Screen

    Google Scholar 

  18. Song, D.X., Wagner, D., Tian, X.: Timing Analysis of Keystrokes and Timing Attacks on SSH. In: USENIX Security Symposium, vol. 2001 (2001)

    Google Scholar 

  19. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Transactions on Information and System Security (TISSEC) 5(4), 367–397 (2002)

    Article  Google Scholar 

  20. Everitt, R.A.J., McOwan, P.W.: Java-based internet biometric authentication system. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(9), 1166–1172 (2003)

    Article  Google Scholar 

  21. Yu, E., Cho, S.: Keystroke dynamics identity verification—its problems and practical solutions. Computers & Security 23(5), 428–440 (2004)

    Article  Google Scholar 

  22. Ashbourn, J.: The distinction between authentication and identification. Paper available at the Avanti Biometric Reference Site (homepage. ntlworld. com/avanti) (2000)

    Google Scholar 

  23. Axelsson, S.: Intrusion detection systems: A survey and taxonomy, vol. 99. Technical report (2000)

    Google Scholar 

  24. Roberts, C.: Biometric technologiesfingerprints, pp. 1–23. Publisher name and location are missing (2006)

    Google Scholar 

  25. Kekre, H.B., et al.: Keystroke dynamic analysis using relative entropy & timing sequence Euclidian distance. In: Proceedings of the International Conference & Workshop on Emerging Trends in Technology. ACM (2011)

    Google Scholar 

  26. Jain, A.K., Flynn, P.,, A.: Handbook of Biometrics. Springer, USA (2007) ISBN-13: 978-0-387-71040-2

    Google Scholar 

  27. Bergadano, Gunetti, Picardi: User Authentication through keystroke dynamics. ACM Trans. Information and System Security (November 2002)

    Google Scholar 

  28. Gaines, R., Press, S., Lisowski, W., Shapiro, N.: Authentication by keystroke timing. Rand Report R-256NSF, Rand Corporation (1980)

    Google Scholar 

  29. Monrose, F., Rubin, A.: Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 16(4) (2000)

    Google Scholar 

  30. Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Communications of the ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Senthil Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kumar, T.S., Suresh, A., Karumathil, A. (2014). Improvised Classification Model for Cloud Based Authentication Using Keystroke Dynamics. In: Park, J., Pan, Y., Kim, CS., Yang, Y. (eds) Future Information Technology. Lecture Notes in Electrical Engineering, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55038-6_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55038-6_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55037-9

  • Online ISBN: 978-3-642-55038-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics