SlideShare a Scribd company logo
1 of 3
Download to read offline
Developing User Authentication by Knowledge
Based Authentication Scheme in Governmental
Organizations
Ali alkhalifah
Information Technology Department
College of Computer, Qassim University
Qassim, Saudi Arabia
a.alkhalifah@qu.edu.sa
Saleh Albahli
Information Technology Department
College of Computer, Qassim University
Qassim, Saudi Arabia
salbahli@qu.edu.sa
Abstract— Information security plays an important role in
governments. Its realm has been increased nowadays, especially
with resent viruses’ attacks in different governmental
organizations. The authentication is aspect of information
security, its current scheme used nowadays in the systems is
depend on the login by user name and password in addition to
one-time password or traditional secret questions, which in turn
is usually easy to predicate. This paper proposes enhanced
knowledge based authentication solution which ensures and
provides more security and usability levels for governmental
organizations.
Keywords—Authentication; Knowledge based authentication;
security; security;usability (key words)
I. INTRODUCTION
More corporate applications and information nowadays
have been accessible through the Internet. Users are concerned
about their security of their activities that they apply on
implement in the cyber world or any other place where
authentication is required. The importance of Information
security realm have been increased these days. The new wave
of attack (Shamoon virus) in Saudi Arabia have an impact on
different organizations. Attackers are targeting the government
agencies and other large institutions. “at least 22 big
institutions were affected by the Shamoon virus. Therefore,
several Saudi organizations have been affected by the new
wave of attacks, including the labor ministry and other 15
government agencies so far”, Al Ekhbariya TV reported. Many
governmental organizations suffered from the huge cyber-
attacks since more than 35,000 computers were wiped and
destroyed. Authentication is an important part when we interact
with different technologies and online systems. The
authentication is an aspect of data security, its current scheme
used nowadays in the systems is depend on the login by user
name and password in addition to one-time password or
traditional secret questions, which in turn is usually easy to
predicate. The concept of knowledge based authentication
(KBA) is gaining wide acceptance gradually with time. It gives
the user an authentication on the basis of knowledge of some
secret information, regularly via a real-time interactive
question and answer process. The aim of this paper is to
provide enhanced knowledge based authentication solution
which ensures and provide more security and usability levels
for both individuals and governments.
II. PROBLEM SPECIFICATION
Many employees access online systems and may play different
roles in their account (see figure 1). They use one identity to
log in to the system. For example, the employee can use the
same username and password to access the system as user,
account manager or admin. A study shows that %61 of users
are more likely to share a work password than a personal
password [2]. In this regards, if the user authentication
information hacked, the malicious will have full control over
other roles' information. Therefore, it is important to have a
mechanism to detect whether the logged-in user is the same
user in control of the user's roles. Thus, secure authentication
solution should be developed. As solution KBA stands, which
depend on something user knows, it uses real-time interactive
question answer process in order to improve security and
reduce predication chance [1].
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
246 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
Fig.1. User Authentication with Multiple Roles
III. RELATED WORKS
KBA is a method to verify the user’s identity by matching at
least one piece of information through providing secret
knowledge. The knowledge based authentication techniques
include text passwords, graphical passwords and visual
passwords [1, 4].
A study [3] investigated the usability and security of user
chosen secret questions as authentication method. The results
demonstrated the use of challenge questions alone is not
secure, and not trustworthy authentication mechanisms.
Hamilton et al., [6] observed that numerous schemes have
been advanced geared towards offering the necessary security
though it is hard to put in place especially for end users. The
use of passwords is one approach that has been suggested by
many researchers as an appropriate security measure. Many
studies showed that the use of passwords is faced with the
challenge of sharing and forgetfulness [1,2,4].
Research work in user authentication has achieved several
authentication schemes but the existing schemes focus on the
benefits instead of their drawbacks in terms of security, and
usability. A study [5] found that one-time password (OTP)
could be the better scheme to use in the application based on
the attributes, technology and other factors, followed by recent
message, one-time image, finger print authentication, GPS
authentication, respectfully.
Existing literature argue that KBA specifically secret
questions provide more secure solution. However, it has some
challenges such as quessablity and memorability [7,8].
Answers should be difficult to guess and have a huge answer.
Questions that can be guessed successfully in a small number
of attempts (for example, “What is your eye color?”) do not
make secure secret questions [3]. This research paper proposes
new secret questions as KBA which it depends in the roles of
the users.
IV. PROPOSED SCHEMA
As we discussed previously (problem specification section),
authentication system should provide strong scheme while
maintaining users' roles. We propose that KBA scheme as
multi-factors authentication method to allow users' roles while
influencing them specifically admins toward stronger
authentication (see figure2). In effect, this proposed KBA
approach makes choosing a more secure authentication
method by giving more authentication sessions and criteria in
each roles specified (see figure 3).
Fig.2. Proposed KBA Schema
Fig.3. Developed Security Criteria and KBA Variables
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
247 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
V. METHODOLOGY
With Information Technology area, engineering research
focuses on discovering solutions to the problems. It applies
problem-solving in its direction and it contains two types. The
first type includes the application, developing, testing and
breaking of information technology [9]. This type explores
the existing knowledge of an area and classifying the problems
that require to be solved. The second type consists of
conceptualization, construction, prototyping, testing and
application of new knowledge [9,10].
This project will use the second type of oriented problem
research that includes experimenting and prototyping of new
technology to find the solutions for identified problems.
Through the literature review, a research problem will be
developed and categorized. With an identified problem, the
methodology and technique includes the design of an
information technology artifact in the attempt will be used to
explain and test this new authentication solution.
We will choose one governamental organizations in Saudi
Arabia(e.g Ministry, University , city-state ), to study and test
the proposed solution in its enviroment.
VI. RESEARCH CONTRIBUTION
Information security solutions play a major role of preventing
threats facing organizations in Saudi Arabia and the world in
general. The following points can be summarized the value of
the proposed model:
• Organizations need to perform risk assessments and
come up with identity and access management
solutions to prevent malicious attacks or other forms
of attacks. Therefore, an organization needs solutions
to secure both the data and the resources to prevent
damages which can incur losses to institutions.
• Developing strategies and perform best practice
guidelines to enhance security for individuals and
governments.
• Addressing critical attacks happened in specific
region and reduce the impact of them.
VII. CONCLOUSION
The objectives of this paper were the following.
Firstly,come up with identity and access management
solutions for government organizations to prevent
malicious attacks or other forms of attacks.Secondly, help
organisation to meet the aim of Saudi Arabia Vision
2030, to improve the processes and regulasation that
affect the digitization. Thirdly, Outline the concern over
the protection of identity information in the cyber realm.
Finaly, highlight the role of KBA in enhancing protection
of user authentication and privacy.
This research contributes to the society by helping the
governments' sectors to provide more secure and trusted
online services.
REFERENCES
[1] A.Alkhalifah, Geoff D. Skinner “Enhanced Knowledge Based
Authentication Using Iterative Session Parameters” World Academy of
Science, Engineering and Technology Vol.71 ,No.7,2010.
[2] IAM: OVERCOMING THE AUTHENTICATION CHALLENG ,2016
, white paper
[3] M. Just, “Account Recovery Challenges: Secure and Usable
Authentication,” Information Security Summit. 2009.
[4] Gkarafli, S. & Economides, A. A,“Comparing the proof by knowledge
authentication techniques” International Journal of Computer Science
and Security.Vol. 4 ,2010,pp. 237-255
[5] S. Sangeeth Kumar, and R Venkatesan. "Ranking of Authentication
Schemes Based on Critical Limiting Factors." International Journal of
Computer Applications Vol.92,No.7,2014.
[6] S. Hamilton, C. Carlisle, and A. Hamilton, “A Global Look at
Authentication.” Proceedings of the 2007 IEEE Workshop on
Information Assurance United States Military Academy, West Point,
NY 20-22 June 2007.
[7] A. Rabkin Personal knowledge questions for fallback authentication:
Security questions in the era of Facebook. July 2008.
[8] M. Jakobsson, E. Stolterman and S. Liu Yang. Love and Authentication.
April 2008.
[9] Hevner, A.R., et al., Design Science in Information Systems Research.
MIS Quarterly, Vol.28,No.1,2004,p.p. 75- 105.
[10] Creswell, John W. Research Design : Qualitative, Quantitative, and
Mixed Methods Approaches. 3rd ed. Los Angeles: SAGE, 2009.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
248 https://sites.google.com/site/ijcsis/
ISSN 1947-5500

More Related Content

What's hot

A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelCSCJournals
 
Hazards of Biometric Authentication in Practice
Hazards of Biometric Authentication in PracticeHazards of Biometric Authentication in Practice
Hazards of Biometric Authentication in PracticeITIIIndustries
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...IJCSIS Research Publications
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login SessionIRJET Journal
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesConfident Technologies
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTUREIJCNC
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSIJNSA Journal
 
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET-  	  Autobiographical Fallback Authentication using SmartphonesIRJET-  	  Autobiographical Fallback Authentication using Smartphones
IRJET- Autobiographical Fallback Authentication using SmartphonesIRJET Journal
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
 
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor ApproachContextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor ApproachPortalGuard
 

What's hot (20)

A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Hazards of Biometric Authentication in Practice
Hazards of Biometric Authentication in PracticeHazards of Biometric Authentication in Practice
Hazards of Biometric Authentication in Practice
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
 
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET-  	  Autobiographical Fallback Authentication using SmartphonesIRJET-  	  Autobiographical Fallback Authentication using Smartphones
IRJET- Autobiographical Fallback Authentication using Smartphones
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
 
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor ApproachContextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach
 

Similar to Developing User Authentication by Knowledge Based Authentication Scheme in Governmental Organizations

Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management ActMichelle Singh
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESIRJET Journal
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityIJNSA Journal
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIRJET Journal
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
 
NDSS_submission_240
NDSS_submission_240NDSS_submission_240
NDSS_submission_240Sakshi Jain
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxSarvaniShettigar
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsUbisecure
 
Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...TELKOMNIKA JOURNAL
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSIJNSA Journal
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES ijwscjournal
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESMODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESijwscjournal
 

Similar to Developing User Authentication by Knowledge Based Authentication Scheme in Governmental Organizations (20)

Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital Identity
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 
NDSS_submission_240
NDSS_submission_240NDSS_submission_240
NDSS_submission_240
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESMODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Developing User Authentication by Knowledge Based Authentication Scheme in Governmental Organizations

  • 1. Developing User Authentication by Knowledge Based Authentication Scheme in Governmental Organizations Ali alkhalifah Information Technology Department College of Computer, Qassim University Qassim, Saudi Arabia a.alkhalifah@qu.edu.sa Saleh Albahli Information Technology Department College of Computer, Qassim University Qassim, Saudi Arabia salbahli@qu.edu.sa Abstract— Information security plays an important role in governments. Its realm has been increased nowadays, especially with resent viruses’ attacks in different governmental organizations. The authentication is aspect of information security, its current scheme used nowadays in the systems is depend on the login by user name and password in addition to one-time password or traditional secret questions, which in turn is usually easy to predicate. This paper proposes enhanced knowledge based authentication solution which ensures and provides more security and usability levels for governmental organizations. Keywords—Authentication; Knowledge based authentication; security; security;usability (key words) I. INTRODUCTION More corporate applications and information nowadays have been accessible through the Internet. Users are concerned about their security of their activities that they apply on implement in the cyber world or any other place where authentication is required. The importance of Information security realm have been increased these days. The new wave of attack (Shamoon virus) in Saudi Arabia have an impact on different organizations. Attackers are targeting the government agencies and other large institutions. “at least 22 big institutions were affected by the Shamoon virus. Therefore, several Saudi organizations have been affected by the new wave of attacks, including the labor ministry and other 15 government agencies so far”, Al Ekhbariya TV reported. Many governmental organizations suffered from the huge cyber- attacks since more than 35,000 computers were wiped and destroyed. Authentication is an important part when we interact with different technologies and online systems. The authentication is an aspect of data security, its current scheme used nowadays in the systems is depend on the login by user name and password in addition to one-time password or traditional secret questions, which in turn is usually easy to predicate. The concept of knowledge based authentication (KBA) is gaining wide acceptance gradually with time. It gives the user an authentication on the basis of knowledge of some secret information, regularly via a real-time interactive question and answer process. The aim of this paper is to provide enhanced knowledge based authentication solution which ensures and provide more security and usability levels for both individuals and governments. II. PROBLEM SPECIFICATION Many employees access online systems and may play different roles in their account (see figure 1). They use one identity to log in to the system. For example, the employee can use the same username and password to access the system as user, account manager or admin. A study shows that %61 of users are more likely to share a work password than a personal password [2]. In this regards, if the user authentication information hacked, the malicious will have full control over other roles' information. Therefore, it is important to have a mechanism to detect whether the logged-in user is the same user in control of the user's roles. Thus, secure authentication solution should be developed. As solution KBA stands, which depend on something user knows, it uses real-time interactive question answer process in order to improve security and reduce predication chance [1]. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 246 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 2. Fig.1. User Authentication with Multiple Roles III. RELATED WORKS KBA is a method to verify the user’s identity by matching at least one piece of information through providing secret knowledge. The knowledge based authentication techniques include text passwords, graphical passwords and visual passwords [1, 4]. A study [3] investigated the usability and security of user chosen secret questions as authentication method. The results demonstrated the use of challenge questions alone is not secure, and not trustworthy authentication mechanisms. Hamilton et al., [6] observed that numerous schemes have been advanced geared towards offering the necessary security though it is hard to put in place especially for end users. The use of passwords is one approach that has been suggested by many researchers as an appropriate security measure. Many studies showed that the use of passwords is faced with the challenge of sharing and forgetfulness [1,2,4]. Research work in user authentication has achieved several authentication schemes but the existing schemes focus on the benefits instead of their drawbacks in terms of security, and usability. A study [5] found that one-time password (OTP) could be the better scheme to use in the application based on the attributes, technology and other factors, followed by recent message, one-time image, finger print authentication, GPS authentication, respectfully. Existing literature argue that KBA specifically secret questions provide more secure solution. However, it has some challenges such as quessablity and memorability [7,8]. Answers should be difficult to guess and have a huge answer. Questions that can be guessed successfully in a small number of attempts (for example, “What is your eye color?”) do not make secure secret questions [3]. This research paper proposes new secret questions as KBA which it depends in the roles of the users. IV. PROPOSED SCHEMA As we discussed previously (problem specification section), authentication system should provide strong scheme while maintaining users' roles. We propose that KBA scheme as multi-factors authentication method to allow users' roles while influencing them specifically admins toward stronger authentication (see figure2). In effect, this proposed KBA approach makes choosing a more secure authentication method by giving more authentication sessions and criteria in each roles specified (see figure 3). Fig.2. Proposed KBA Schema Fig.3. Developed Security Criteria and KBA Variables International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 247 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 3. V. METHODOLOGY With Information Technology area, engineering research focuses on discovering solutions to the problems. It applies problem-solving in its direction and it contains two types. The first type includes the application, developing, testing and breaking of information technology [9]. This type explores the existing knowledge of an area and classifying the problems that require to be solved. The second type consists of conceptualization, construction, prototyping, testing and application of new knowledge [9,10]. This project will use the second type of oriented problem research that includes experimenting and prototyping of new technology to find the solutions for identified problems. Through the literature review, a research problem will be developed and categorized. With an identified problem, the methodology and technique includes the design of an information technology artifact in the attempt will be used to explain and test this new authentication solution. We will choose one governamental organizations in Saudi Arabia(e.g Ministry, University , city-state ), to study and test the proposed solution in its enviroment. VI. RESEARCH CONTRIBUTION Information security solutions play a major role of preventing threats facing organizations in Saudi Arabia and the world in general. The following points can be summarized the value of the proposed model: • Organizations need to perform risk assessments and come up with identity and access management solutions to prevent malicious attacks or other forms of attacks. Therefore, an organization needs solutions to secure both the data and the resources to prevent damages which can incur losses to institutions. • Developing strategies and perform best practice guidelines to enhance security for individuals and governments. • Addressing critical attacks happened in specific region and reduce the impact of them. VII. CONCLOUSION The objectives of this paper were the following. Firstly,come up with identity and access management solutions for government organizations to prevent malicious attacks or other forms of attacks.Secondly, help organisation to meet the aim of Saudi Arabia Vision 2030, to improve the processes and regulasation that affect the digitization. Thirdly, Outline the concern over the protection of identity information in the cyber realm. Finaly, highlight the role of KBA in enhancing protection of user authentication and privacy. This research contributes to the society by helping the governments' sectors to provide more secure and trusted online services. REFERENCES [1] A.Alkhalifah, Geoff D. Skinner “Enhanced Knowledge Based Authentication Using Iterative Session Parameters” World Academy of Science, Engineering and Technology Vol.71 ,No.7,2010. [2] IAM: OVERCOMING THE AUTHENTICATION CHALLENG ,2016 , white paper [3] M. Just, “Account Recovery Challenges: Secure and Usable Authentication,” Information Security Summit. 2009. [4] Gkarafli, S. & Economides, A. A,“Comparing the proof by knowledge authentication techniques” International Journal of Computer Science and Security.Vol. 4 ,2010,pp. 237-255 [5] S. Sangeeth Kumar, and R Venkatesan. "Ranking of Authentication Schemes Based on Critical Limiting Factors." International Journal of Computer Applications Vol.92,No.7,2014. [6] S. Hamilton, C. Carlisle, and A. Hamilton, “A Global Look at Authentication.” Proceedings of the 2007 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY 20-22 June 2007. [7] A. Rabkin Personal knowledge questions for fallback authentication: Security questions in the era of Facebook. July 2008. [8] M. Jakobsson, E. Stolterman and S. Liu Yang. Love and Authentication. April 2008. [9] Hevner, A.R., et al., Design Science in Information Systems Research. MIS Quarterly, Vol.28,No.1,2004,p.p. 75- 105. [10] Creswell, John W. Research Design : Qualitative, Quantitative, and Mixed Methods Approaches. 3rd ed. Los Angeles: SAGE, 2009. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 248 https://sites.google.com/site/ijcsis/ ISSN 1947-5500