Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
A Survey on Continuous User Identity Verification Using Biometric Traits for Secure Internet Services
Harshal A. Kute, D. N. Rewadkar
Security of the web based services is become serious concern now a days. Secure user authentication is very important and fundamental in most of the systems User authentication systems are traditionally based on pairs of username and password and verify the identity of the user only at login phase. No checks are performed during working sessions, which are terminated by an explicit logout or expire after an idle activity period of the user. Emerging biometric solutions provides substituting username and password with biometric data during session establishment, but in such an approach still a single shot verification is less sufficient, and the identity of a user is considered permanent during the entire session. A basic solution is to use very short session timeouts and periodically request the user to input his credentials over and over, but this is not a definitive solution and heavily penalizes the service usability and ultimately the satisfaction of users. This paper explores promising alternatives offered by applying biometrics in the management of sessions. A secure protocol is defined for perpetual authentication through continuous user verification. Finally, the use of biometric authentication allows credentials to be acquired transparently i.e. without explicitly notifying the user or requiring his interaction, which is essential to guarantee better service usability.
Keywords: Web Security, Authentication, Continuous user verification, biometric authentication
Edition: Volume 3 Issue 12, December 2014
Pages: 510 - 514
How to Cite this Article?
Harshal A. Kute, D. N. Rewadkar, "A Survey on Continuous User Identity Verification Using Biometric Traits for Secure Internet Services", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14395, Volume 3 Issue 12, December 2014, 510 - 514
105 PDF Views | 87 PDF Downloads
Similar Articles with Keyword 'Web Security'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2302 - 2306VILEEAR: Detection of Drive by Download attack on Malicious Web Pages
Chirag R. Desai, Dr. Narendra M. Shekokar
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 1410 - 1412Device Fingerprinting for Secure User Enrollment using TEE
Prathamesh Raut, Bhushan Patil
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 852 - 855An Efficient User Authentication using Captcha and Graphical Passwords-A Survey
S. Karthika, Dr. P. Devaki
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3002 - 3005Survey Paper on Genetically Optimized Face Image CAPTCHA
Juhi Shah, D. N. Rewadkar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2585 - 2588A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection
M.S. Patole, Sagar D. Kothimbire
Similar Articles with Keyword 'Authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1724 - 1727Privacy Preserving Authenticity Framework for Shared Data Cloud Network
P. Vanitha Sree, K. Narayana Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Similar Articles with Keyword 'biometric authentication'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2707 - 2709NVSS Scheme Based ATM Authentication Using Fingerprint Matching
Nasla K, Hemand E P
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2694 - 2699Antispoofing Methods for Authenticating Live Users in Biometric System
Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1459 - 1463A System for Providing Highly Secured Authentication
Kishori N. Ushir, R. B. Joshi
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2031 - 2035A Review on Various Fusion and Features Extraction Approaches for Multi-Modal Biometric Authentication System
Hardeep Kaur, Paramjit Kaur
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016
Pages: 983 - 988An Optimal and Smarter Recognition Pattern Based on Eigen Visual Perception
Parveen Yadav, Rahul Kadian