Keystroke dynamics-based user authentication service for cloud computing

被引:3
作者
Abo-alian, Alshaimaa [1 ]
Badr, Nagwa L. [1 ]
Tolba, M. F. [1 ]
机构
[1] Ain Shams Univ, Fac Comp & Informat Sci, Cairo, Egypt
关键词
keystroke dynamics; authentication; cloud computing; PERFORMANCE; IDENTIFICATION; BIOMETRICS; ALGORITHM;
D O I
10.1002/cpe.3718
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
User authentication is a crucial requirement for cloud service providers to prove that the outsourced data and services are safe from imposters. Keystroke dynamics is a promising behavioral biometrics for strengthening user authentication, however, current keystroke based solutions designed for certain datasets, for example, a fixed length text typed on a traditional personal computer keyboard and their authentication performances were not acceptable for other input devices nor free length text. Moreover, they suffer from a high dimensional feature space that degrades the authentication accuracy and performance. In this paper, a keystroke dynamics based authentication system is proposed for cloud environments that is applicable to fixed and free text typed on traditional and touch screen keyboards. The proposed system utilizes different feature extraction methods, as a preprocessing step, to minimize the feature space dimensionality. Moreover, different fusion rules are evaluated to combine the different feature extraction methods so that a set of the most relevant features is chosen. Because of the huge number of users' samples, a clustering method is applied to the users' profile templates to reduce the verification time. The proposed system is applied to three different benchmark datasets using three different classifiers. Experimental results demonstrate the effectiveness and efficiency of the proposed system. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:2567 / 2585
页数:19
相关论文
共 43 条
[1]   Auditing-as-a-Service for Cloud Storage [J].
Abo-alian, Alshaimaa ;
Badr, N. L. ;
Tolba, M. F. .
INTELLIGENT SYSTEMS'2014, VOL 1: MATHEMATICAL FOUNDATIONS, THEORY, ANALYSES, 2015, 322 :559-568
[2]   Biometric Recognition Based on Free-Text Keystroke Dynamics [J].
Ahmed, Ahmed A. ;
Traore, Issa .
IEEE TRANSACTIONS ON CYBERNETICS, 2014, 44 (04) :458-472
[3]  
Al Solami E., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P229, DOI 10.1109/ICNSS.2011.6060005
[4]   Keystroke recognition in user authentication using ANN based RGB histogram technique [J].
Alpar, Orcan .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2014, 32 :213-217
[5]  
[Anonymous], 2013, ISRN SIGNAL PROCESSI
[6]  
[Anonymous], 2014, EMERGING RES ELECT C
[7]  
[Anonymous], 1993, DETECT HANDLE OUTLIE
[8]  
[Anonymous], 2002, LEAST SQUARES SUPPOR
[9]  
[Anonymous], ACM T INFORM S UNPUB
[10]  
[Anonymous], 2010, PROC 4 IEEE INT C BI