CONTINUOUS AND TRANSPARENT USER IDENTITY VERIFICATION FOR SECURE INTERNET SERVICES

Alagappa Institute of Skill Development & Computer Centre,Alagappa University, Karaikudi, India.15 -16 February 2017. IT Skills Show & International Conference on Advancements In Computing Resources (SSICACR-2017)

Format: Volume 5, Issue 1, No 22, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017

Author: R.JOTHI,M.KANCHANA,Dr.C.BHUVANESWARI

Reference:IJCS-261

View PDF Format

Abstract

Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to re-authenticate him for continued access to the protected resource. This may not be sufficient for high security environment in which the protector resource name needs to be continuously monitored for unauthorized use. In such cases, continues verification is needed. The proposed approach for continues user verification is CASHMA (Context Aware Security by Hierarchical Multilevel Architecture) System. The protocol determines adaptive timeouts based on the quality, frequency and type of biometric data transparently acquired from the user. The new proposed system that continually verify the presence/participation of a logged in user. For most computer system, once the identity of the user has been verified at login, the system resources are typically made available to the user until the user exits the system. In such system username and password are used for authentication. Here biometric technique offer solution for secure and trusted authentication. We use multiple biometric verification for continuous and transparent verification. So that achieves Higher Security then traditional authentication system. To achieve high security over data transmission, AODV (ad-hoc on demand distance vector) protocol has been used in this proposed work. The proposed method provides security and fast transmission. Simulation result shows that, this proposed method minimizes

References

[1] CASHMA-Context Aware Security by Hierarchical Multilevel Architectures, MIUR FIRB, 2005 [2] R. Brunelli and D. Falavigna, Person Identification using Multiple Cues, IEEE Transactions on PAMI, Vol 12, pp. 955-966, Oct. 1995. [3]. N.K. Ratha, J.H. Connell, and R.M. Bolle, “An analysis of minutiae matching strength”, Proc. AVBPA 2001, Third International Conference on Audio- and Video-Based Biometric Person Authentication, pp. 223-228, 2001. [4] John Daugman, Biometric Decision Landscapes, Technical Report, University of Cambridge, UK, 1999. [5. D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, 2003. [6 L. Hong and A. Jain, Integrating Faces and Fingerprints for Personal Identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 20, No. 12, pp. 1295-1307, Dec. 1998. [7] L. Hong, A. K. Jain, and S. Pankanti, Can Multibiometrics Improve Performance?, In Proceedings AutoID‟99, NJ, USA, pp. 59-64, Oct. 1999. [8] A. K. Jain, R. Bolle, and S. Pankanti, Multimodal Biometrics: Personal Identification in a Networked Society, Kluwer Academic Publishers, pp. 1-38, 1999. [9] N. Poh and J. Korczak, Hybrid Biometric Authentication System Using Face and Voice Features, Third International Conference on AVBPA, pp. 348-353, 2001.

Keywords

CASHMA, Security, Biometric User Verification.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog