Abstract
The etymology of communication is the transmission of data. Data has to be transmitted through different devices, network topologies and geographic locations. The strength of communication has tripled with the advent of cloud technologies providing high scalability and storage on demand. The need for cloud security is increasing in an alarming rate and using biometric techniques over traditional password based alternative has proved to be efficient. A behavioral biometric such as keystroke dynamics can be used to strengthen existing security techniques effectively .Due to the semi-autonomous nature of the typing behavior of an individual it is difficult to validate the identity of the user. This paper proposes a model to validate the identity of the user which acclimatizes to tolerance across multiple devices and provides a robust three dimensional model for classification. As an additional layer of security the model is transformed after every login to prevent professional intruders from predicting the acceptance region.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kumar, S.T., Priyanka, U.S., Abinaya, K.: Article: Towards an Approach for Improved Security in Wireless Networks. In: IJCA Proceedings on International Conference on Innovation in Communication, Information and Computing, ICICIC 2013, vol. (1), pp. 23–27. Foundation of Computer Science, New York (2013)
Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security (TISSEC) 3(3), 186–205 (2000)
Ashbourn, J.: Biometrics: advanced identity verification. Springer (2000)
Adler, A., Youmaran, R., Loyka, S.: Information content of biometric features. In: Biometrics Consortium Conference (2005)
Ilonen, J.: Keystroke dynamics. Advanced Topics in Information Processing–Lecture (2003); 03-04
Kanade, S., et al.: Application of biometrics to obtain high entropy cryptographic keys. World Acad. Sci. Eng.Tech. 52 (2009)
Adler, A., Youmaran, R., Loyka, S.: Towards a measure of biometric feature information. Pattern Analysis and Applications 12(3), 261–270 (2009)
Uludag, U., et al.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948–960 (2004)
Li, Y., et al.: Study on the BeiHang keystroke dynamics database. In: 2011 International Joint Conference on Biometrics (IJCB). IEEE (2011)
Rudrapal, D., et al.: Attacker Detection by Analyzing User Keystroke Credential. Lecture Notes on Software Engineering 1(1) (2013)
Chang, T.-Y., et al.: User Authentication Using Rhythm Click Characteristics for Non-Keyboard Devices. In: Proc. of the 2011 International Conference on Asia Agriculture and Animal, IPCBEE (2011)
Teh, P.S., Yue, S., Teoh, A.B.J.: Feature Fusion Approach on Keystroke Dynamics Efficiency Enhancement. International Journal of CyberSecurity and Digital Forensics (IJCSDF) 1(1), 20–31 (2012)
Banerjee, S.P.: Biometric authentication and identification using keystroke dynamics: A survey. ournal of Pattern Recognition Research 7, 116–139 (2012)
Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: Approaches, security and challenges. arXiv preprint arXiv:0910.0817 (2009)
Mandujano, S., Soto, R.: Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data. In: Proceedings of the Fifth Mexican International Conference in IEEE Computer Science, ENC 2004 (2004)
Boechat, G.C., Ferreira, J.C., Carvalho, E.C.B.: Using the keystrokes dynamic for systems of personal security. Transactions on Engineering, Computing and Technology. Enformatika 18(1), 200–205 (2006)
Johansen, U.A.: Keystroke Dynamics on a Device with Touch Screen
Song, D.X., Wagner, D., Tian, X.: Timing Analysis of Keystrokes and Timing Attacks on SSH. In: USENIX Security Symposium, vol. 2001 (2001)
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Transactions on Information and System Security (TISSEC) 5(4), 367–397 (2002)
Everitt, R.A.J., McOwan, P.W.: Java-based internet biometric authentication system. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(9), 1166–1172 (2003)
Yu, E., Cho, S.: Keystroke dynamics identity verification—its problems and practical solutions. Computers & Security 23(5), 428–440 (2004)
Ashbourn, J.: The distinction between authentication and identification. Paper available at the Avanti Biometric Reference Site (homepage. ntlworld. com/avanti) (2000)
Axelsson, S.: Intrusion detection systems: A survey and taxonomy, vol. 99. Technical report (2000)
Roberts, C.: Biometric technologiesfingerprints, pp. 1–23. Publisher name and location are missing (2006)
Kekre, H.B., et al.: Keystroke dynamic analysis using relative entropy & timing sequence Euclidian distance. In: Proceedings of the International Conference & Workshop on Emerging Trends in Technology. ACM (2011)
Jain, A.K., Flynn, P.,, A.: Handbook of Biometrics. Springer, USA (2007) ISBN-13: 978-0-387-71040-2
Bergadano, Gunetti, Picardi: User Authentication through keystroke dynamics. ACM Trans. Information and System Security (November 2002)
Gaines, R., Press, S., Lisowski, W., Shapiro, N.: Authentication by keystroke timing. Rand Report R-256NSF, Rand Corporation (1980)
Monrose, F., Rubin, A.: Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 16(4) (2000)
Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Communications of the ACM 33(2), 168–176 (1990)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kumar, T.S., Suresh, A., Karumathil, A. (2014). Improvised Classification Model for Cloud Based Authentication Using Keystroke Dynamics. In: Park, J., Pan, Y., Kim, CS., Yang, Y. (eds) Future Information Technology. Lecture Notes in Electrical Engineering, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55038-6_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-55038-6_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55037-9
Online ISBN: 978-3-642-55038-6
eBook Packages: EngineeringEngineering (R0)