Keystroke dynamics-based user authentication service for cloud computing

被引:3
作者
Abo-alian, Alshaimaa [1 ]
Badr, Nagwa L. [1 ]
Tolba, M. F. [1 ]
机构
[1] Ain Shams Univ, Fac Comp & Informat Sci, Cairo, Egypt
关键词
keystroke dynamics; authentication; cloud computing; PERFORMANCE; IDENTIFICATION; BIOMETRICS; ALGORITHM;
D O I
10.1002/cpe.3718
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
User authentication is a crucial requirement for cloud service providers to prove that the outsourced data and services are safe from imposters. Keystroke dynamics is a promising behavioral biometrics for strengthening user authentication, however, current keystroke based solutions designed for certain datasets, for example, a fixed length text typed on a traditional personal computer keyboard and their authentication performances were not acceptable for other input devices nor free length text. Moreover, they suffer from a high dimensional feature space that degrades the authentication accuracy and performance. In this paper, a keystroke dynamics based authentication system is proposed for cloud environments that is applicable to fixed and free text typed on traditional and touch screen keyboards. The proposed system utilizes different feature extraction methods, as a preprocessing step, to minimize the feature space dimensionality. Moreover, different fusion rules are evaluated to combine the different feature extraction methods so that a set of the most relevant features is chosen. Because of the huge number of users' samples, a clustering method is applied to the users' profile templates to reduce the verification time. The proposed system is applied to three different benchmark datasets using three different classifiers. Experimental results demonstrate the effectiveness and efficiency of the proposed system. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:2567 / 2585
页数:19
相关论文
共 43 条
[31]  
Lachenbruch P.A., 1975, DISCRIMINANT ANAL
[32]  
Meng W, 2015, IEEE COMMUN SURV TUT, P1
[33]   A simple and fast algorithm for K-medoids clustering [J].
Park, Hae-Sang ;
Jun, Chi-Hyuck .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) :3336-3341
[34]  
Pinto P, 2014, LECT NOTES COMPUT SC, V8735, P33, DOI 10.1007/978-3-662-44885-4_3
[35]   Deterministically annealed design of hidden Markov model speech recognizers [J].
Rao, AV ;
Rose, K .
IEEE TRANSACTIONS ON SPEECH AND AUDIO PROCESSING, 2001, 9 (02) :111-126
[36]  
Rezaei A, 2012, INT J COMPUT SCI NET, V12, P60
[37]  
Seo S, 2006, REV COMP METHODS DET
[38]   Robustness of keystroke-dynamics based biometrics against synthetic forgeries [J].
Stefan, Deian ;
Shu, Xiaokui ;
Yao, Danfeng .
COMPUTERS & SECURITY, 2012, 31 (01) :109-121
[39]   A Survey of Keystroke Dynamics Biometrics [J].
Teh, Pin Shen ;
Teoh, Andrew Beng Jin ;
Yue, Shigang .
SCIENTIFIC WORLD JOURNAL, 2013,
[40]   A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset [J].
Uzun, Yasin ;
Bicakci, Kemal .
COMPUTERS & SECURITY, 2012, 31 (05) :717-726