A Frictionless and Secure User Authentication in Web-Based Premium Applications

被引:2
作者
Olanrewaju, Rashidah F. [1 ]
Khan, Burhan Ul Islam [1 ]
Morshidi, Malik Arman [1 ]
Anwar, Farhat [1 ]
Kiah, Miss Laiha Binti Mat [2 ]
机构
[1] Int Islamic Univ Malaysia IIUM, Dept Elect & Comp Engn, Kulliyyah Engn, Kuala Lumpur 50728, Malaysia
[2] Univ Malaya, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
关键词
Authentication; Security; Privacy; Password; Collaboration; Cloud computing; Browsers; Frictionless experience; internet; security; user authentication; web application; web services; cloud computing; ATTACKS; SECRET;
D O I
10.1109/ACCESS.2021.3110310
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By and large, authentication systems employed for web-based applications primarily utilize conventional username and password-based schemes, which can be compromised easily. Currently, there is an evolution of various complex user authentication schemes based on the sophisticated encryption methodology. However, many of these schemes suffer from either low impact full consequences or offer security at higher resource dependence. Furthermore, most of these schemes don't consider dynamic threat and attack strategies when the clients are exposed to unidentified attack environments. Hence, this paper proposes a secure user authentication mechanism for web applications with a frictionless experience. An automated authentication scheme is designed based on user behavior login events. The uniqueness of user identity is validated in the proposed system at the login interface, followed by implying an appropriate user authentication process. The authentication process is executed under four different login mechanisms, which depend on the profiler and the authenticator function. The profiler uses user behavioral data, including login session time, device location, browser, and details of accessed web services. The system processes these data and generates a user profile via a profiler using the authenticator function. The authenticator provides a login mechanism to the user to perform the authentication process. After successful login attempts, the proposed system updates database for future evaluation in the authentication process. The study outcome shows that the proposed system excels to other authentication schemes for an existing web-based application. The proposed method, when comparatively examined, is found to offer approximately a 10% reduction in delay, 7% faster response time, and 11% minimized memory usage compared with existing authentication schemes for premium web-based applications.
引用
收藏
页码:129240 / 129255
页数:16
相关论文
共 63 条
[1]  
Abramson M., 2013, User authentication from web browsing behavior
[2]   Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective [J].
Alenezi, Mamdouh ;
Agrawal, Alka ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
IEEE ACCESS, 2020, 8 :25543-25556
[3]  
[Anonymous], IDENTIFY GEOGRAPHICA
[4]  
[Anonymous], 2003, P 2003 WORKSH MULT U
[5]   Privacy preserving multi-factor authentication with biometrics [J].
Bhargav-Spantzel, Abhilasha ;
Squicciarini, Anna ;
Modi, Shimon ;
Young, Matthew ;
Bertino, Elisa ;
Elliott, Stephen .
JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) :529-560
[6]  
Bilal M, 2020, INT CONF SOFTW ENG, P82, DOI [10.1109/ICSESS49938.2020.9237635, 10.1109/icsess49938.2020.9237635]
[7]   The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes [J].
Bonneau, Joseph ;
Herley, Cormac ;
van Oorschot, Paul C. ;
Stajano, Frank .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :553-567
[8]  
Bugliesi Michele, 2014, Engineering Secure Software and Systems. 6th International Symposium, ESSoS 2014. Proceedings: LNCS 8364, P161, DOI 10.1007/978-3-319-04897-0_11
[9]   An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem [J].
Chandrakar, Preeti ;
Om, Hari .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) :661-673
[10]  
Chang H, 2011, COMM COM INF SC, V151, P338