Keystroke Dynamics Authentication in Cloud Computing

Author:

Hassan Basma Mohammed1,Fouad Khaled Mohammed1,Hassan Mahmoud Fathy1

Affiliation:

1. Benha University, Egypt

Abstract

Cloud computing needs a strong and efficient authentication system because the user will access his rented part through a faraway connection and it will make the authentication sensor device besides the user place for identification and verification so how to know the user who claimed himself to be the legal user. Keystroke identification system as a biometric authentication technique is strongly Candidate for the security issues in cloud computing technology. Keystroke dynamics as a security system did not need extra hardware because the authentication device will be the existing keyboard based on everyone has a unique style for writing. The other biometric methods are addressed with each advantage and disadvantage along with keystroke method. In this paper, all known studies about keystroke technique are explained and compared between them according to the classification technique, number of the participated users and each study results then introduces a survey on software and hardware of other biometric authentication techniques and after the literature review is addressed then keystroke as a biometric authentication system is suggested to access cloud computing environment because it has many advantages to being a part of the known security systems which spread in our world.

Publisher

IGI Global

Reference102 articles.

1. Single password authentication, Microsoft Research;T.Acar;IACR Archive,2013

2. Ahmad, N., Szymkowiak, A., & Campbell, P. Keystroke dynamics in the pre-touch screen era, Frontiers in Human Neuroscience, Volume 7, Article 835, 1-10

3. An introduction to biometric recognition;K.Anil;IEEE Transactions on Circuits and Systems for Video Technology,2004

4. Authentication method through keystrokes measurement of mobile users in cloud environment;M.Babaeizadeh;International Journal of Advance Soft Computing,2014

5. Authentication methods in cloud computing: A survey, Research Journal of Applied Sciences;M.Babaeizadeh;Engineering and Technology,2015

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3