Submit Search
Upload
IRJET-An Economical and Secured Approach for Continuous and Transparent User Identification for Secure Web Services
•
0 likes
•
34 views
IRJET Journal
Follow
https://irjet.net/archives/V5/i1/IRJET-V5I1164.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IJERA Editor
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
IJERD Editor
Sms based otp
Sms based otp
Hai Nguyen
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
ijiert bestjournal
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
1crore projects
76 s201923
76 s201923
IJRAT
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
Recommended
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IJERA Editor
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
IJERD Editor
Sms based otp
Sms based otp
Hai Nguyen
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
ijiert bestjournal
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
1crore projects
76 s201923
76 s201923
IJRAT
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
IRJET Journal
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
prasanna9
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
eSAT Publishing House
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
Two aspect authentication system using secure
Two aspect authentication system using secure
Uvaraj Shan
Class paper final
Class paper final
Anusha Manchala
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
CSCJournals
Access management
Access management
Venkatesh Jambulingam
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Uvaraj Shan
Kx3518741881
Kx3518741881
IJERA Editor
I1804015458
I1804015458
IOSR Journals
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
Bayalagmaa Davaanyam
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
IJCSIS Research Publications
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
eSAT Journals
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
IRJET Journal
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
IRJET Journal
More Related Content
What's hot
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
IRJET Journal
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
prasanna9
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
eSAT Publishing House
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
Two aspect authentication system using secure
Two aspect authentication system using secure
Uvaraj Shan
Class paper final
Class paper final
Anusha Manchala
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
CSCJournals
Access management
Access management
Venkatesh Jambulingam
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Uvaraj Shan
Kx3518741881
Kx3518741881
IJERA Editor
I1804015458
I1804015458
IOSR Journals
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
Bayalagmaa Davaanyam
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
IJCSIS Research Publications
What's hot
(18)
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
Two aspect authentication system using secure
Two aspect authentication system using secure
Class paper final
Class paper final
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
Access management
Access management
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Kx3518741881
Kx3518741881
I1804015458
I1804015458
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
Similar to IRJET-An Economical and Secured Approach for Continuous and Transparent User Identification for Secure Web Services
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
eSAT Journals
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
IRJET Journal
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
IRJET Journal
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
IRJET Journal
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
Two aspect authentication system using secure
Two aspect authentication system using secure
Uvaraj Shan
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET Journal
An Introduction to Authentication for Applications
An Introduction to Authentication for Applications
Ubisecure
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
IRJET Journal
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
IJNSA Journal
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
IJNSA Journal
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
Asad Zaman
Comparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable Credentials
IRJET Journal
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
IRJET Journal
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
IRJET Journal
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach
PortalGuard
Cybersecurity Slides
Cybersecurity Slides
Jim Kaplan CIA CFE
IRJET - A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
IRJET Journal
Similar to IRJET-An Economical and Secured Approach for Continuous and Transparent User Identification for Secure Web Services
(20)
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
Two aspect authentication system using secure
Two aspect authentication system using secure
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
An Introduction to Authentication for Applications
An Introduction to Authentication for Applications
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
Comparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable Credentials
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach
Cybersecurity Slides
Cybersecurity Slides
IRJET - A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
power system scada applications and uses
power system scada applications and uses
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
IRJET-An Economical and Secured Approach for Continuous and Transparent User Identification for Secure Web Services
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 761 An economical and secured approach for continuous and transparent user identification for secure web services P.Kalyan chakravathy1, K.Vasavi Devi2, T.Sai Sri3, Sk.Abu Saleha4 1,2,3,4 Department of computer science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India –522502. ---------------------------------------------------------------------***--------------------------------------------------------------------- ABSTRACT- Nowadays, it becomes serious concern to provide more security to web services. So, secure user authentication is the fundamental task in security systems. Traditionally, most of the systems are based on pairs of username and password which verifies theidentityofuseronly at login phase. Once the user is identified with username and password, no checks are performed further during working sessions. But emerging biometric solutions substitutes the username and password with biometric data of user .In such approach still single shot check is less effective on the grounds that the personality of client is perpetual amid entire session. Hence, a basic solution is to use very short period of timeouts for each session and periodically request the user to input his credentials over and over. But this is not a proper solution because it heavily affects the service usability and ultimately the satisfaction of users. This paper investigates the framework for ceaseless confirmation of client utilizing his qualifications, for example, biometric characteristics. The utilization of consistent biometric verification framework obtains accreditations without expressly informing the client or requiring client cooperation that is, straightforwardly which is important to ensure better execution and administration ease of use. KEYWORDS-Web Security,Authentication, Continuous user verification, biometric authentication. I. INTRODUCTION: In almost every aspect of human life have computingdevices (such as PC, smart phone, tablet, or smart watches) become important gadgets. The communication services, aviation and financial services are very much controlledbycomputer systems. People entrust with vital information such as medical and criminal records, manage transactions,paybills and private documents. However, this increasing dependency on computer systems, coupled with a growing emphasis on global accessibility in cyberspace, hasunveiled new threats to computer system security. Moreover, violations and frauds in the internet are all over the place. For most existing PC frameworks, once the client'scharacter is checked at login, the system resourcesare availabletothat user until he/she exits the system or locks the session. In fact, the system resources are available to any user during that period. This may be appropriate for low security environments, but can lead to session hijacking, in which an attacker targets an open session, e.g. when people leave the computer unattended for shorter or longer periods when it is unlocked, for example to get a cup of coffee, to go and talk to a colleague, or simply because they do not have the habit of locking a computer because of the inconvenience. In high risk environmentsor where the cost of unauthorizeduseofa computer is high, a continuouscheck of the user’sidentity is extremely important. By utilizing nonstop check the personality of the human working the PC is persistently confirmed. Username and secret word of conventional confirmation framework is get supplant by biometric characteristic if there should be an occurrence of biometric method. Biometrics are the science and technology of determining and identifying the correct user identity based on physiological and behavioural traits which includes face recognition, retinal scans, fingerprint voice recognition and keystroke dynamics. Username and secret word of conventional confirmation framework is get supplant by biometric characteristic if there should be an occurrence of biometric method. Only at the login time. If the identity of user is verified once, then resources of the system are available to user for fixed period of time and the identity of user is permanent for whole session. A basic solution is to use very short session timeouts and periodicallyrequestthe user to input his/her credentials again and again. To opportune identify abuses of PC assets and keep that an unapproved client malignantly replaces an approved one, arrangements in light of multi-modular bio-metric continuous authentication are proposed, turning client confirmation into a nonstop procedure rather than onetime event. To avoid that a single biometric trait is forged, biometrics authentication can rely on multiple biometrics traits .new approach for users verification and session management are discussed in this paper is characterized and actualized with regards to the multi-modular biometric verification framework CASHMA-(ContextAwareSecurityby Hierarchical Multilevel Architecture). The CASHMA framework understands a safe biometric confirmation benefit on the Internet, in this clients need to recall just a single username and utilize their biometric information as opposed to passwords to verify in various web administrations. CASHMA work safely with any sort of web benefit for instance web based managing an account, military zones, and air terminal zone which require high security administrations. II. LITERATURE SURVEY: The introduction to security issues & its concernisdescribed in previoussection. In this literature we have studied earlier research papers related to conventional authentication systems it presents single time authentications of the user. The categorizations of security systems are depend on
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 762 strength of attack and are classified into strong and weak. The summarizing study of earlier research is as follows: 1. Primary approach is knowledge based identity for authentication of user involves is password thai is what you know; Password contains single word, PIN (Personal Identification Number), Phrases that can be reserved secret for authentication. But this primary approach Knowledge based identity does not offer good solution it can be searched or guess by an attacker and they do not present security against repudiation [6]. 2. Secondary approach is object based identity for authentication of user involves what you have is token; Token means a physical device which provides authentication that can be security tokens, access token, storage devices including passwords such as smart card or bank cards [6]. The main disadvantage of Identity token can be lost or stolen and inconvenience and cost. 3. Last approach is ID based authentication for authentication of user it considers who you are. That is simply biometric such as voice recognition, figure print identification, face recognition and signatureoreyescangive stronger defence against attack. Comparing withKnowledge based and object/entity based ID based authentication provides privileged level of security. III. THE CASHMA ARCHITECTURE CASHMA: It means Context-Aware Security by Hierarchical Multilevel Architectures. This system is used for secure biometric authentication on the internet. CASHMA is able to operate securely with any kind of web service, including services with high security demands as online banking services. Contingent upon Preferences and prerequisites of the proprietor of the web benefit the CASHMA confirmation benefit supplant the customary verification benefit. The system architecture is consisting of the CASHMA authentication service, the clients and the web services and they are connected through communication channels. Fig. 1 depicts the constant validation framework to a web benefit. The authentication server, which interacts with the clients, computational servers that perform comparisons of biometric data for verification of the users, and databasesof templates containsthe biometric templatesoftheusers(that are required for user authenticationorverificationpurpose). The web service demands the authentication of users to the CASHMA authentication server. These services are any kind of Internet service. Finally, by clients we mean the users’ devices like (laptops, Desktop PCs, tablets, etc.) which acquire the biometric data corresponding to the various biometric traits from the users, and transmit those information to the CASHMA confirmation server towardsan objective web benefit. A client contains. i) Sensors - acquire the raw data, ii) the CASHMA application - transmits the raw data to the authentication server. The CASHMA confirmation server applies client validation and check methodology that contrast the crude information and the biometric formats put away. Consider online banking where a userwantstolog into an online banking service using a smart phone. Here client and web administrations must be enlisted to CASHMA validation administration and client must be introduced CASHMA application on his advanced cell. The smartphone contacts the online banking service,whichrepliesrequesting the client to contact the CASHMA authentication server and get an authentication certificate. Utilizing the CASHMA application, the cell phone sends its one of a kind identifier and biometric information to the validation server for confirmation. The authentication server verifies the user identity, and grants the access if: i) it is enrolled in the CASHMA authentication service, ii) it has rights to accessthe online banking service and, iii) the acquired biometric data match those stored in the templates database associated to the provided identifier. In case of successful user verification, the CASHMA authentication server releases an authentication certificate to the client, proving itsidentityto third parties, and includes a timeout that sets the maximum duration of the user session. The client presents this certificate to the web service, which verifies it and grants access to the client. The CASHMA application operates to continuously maintain the session open: it transparently acquiresbiometric data from the user, and sendsthemtothe CASHMA authentication server to get a new certificate. Such certificate, which includesa new timeout,isforwardedtothe web service to further extend the user session.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 763 IV. THE CASHMA CERTIFICATE: The data contained in the body of the CASHMA declaration transmitted to the client by utilizing the CASHMA verification server, basic to perceive imperative purposesof the convention. The CASHMA certificates consist of Time stamp and sequence number univocally identify each certificate, and it look after from replay attacks. Id is the person id, e.g., a number. Choice representsthe finalresultof the verification process carried out on the server side. It includes the expiration time of the session, dynamically assigned by the CASHMA authentication server. Typically ,the global trust stage and the session timeout areatalltimes computed by way of considering the time immediate in which the CASHMA application acquires the biometric data, to restrict potential issues concerning unknown delays in conversation and computation. Due to the fact such delays will not be predicable in prior, simply supplying a relative timeout value to the user will not be viable, so the CASHMA server thus provides the absolute immediate of time at which the session must expire. The CASHMA certificateswill probably be expired when the expirationtimeoutattainzero. V. THE CONTINUOUS AUTHENTICATION PROTOCOL: The continuous authentication protocol allows providing adaptive session timeouts to a web service to set up and maintain a secure session with a client. The information contained in the body of the CASHMA statement transmitted to the customer by using the CASHMA confirmation server, fundamental to see basic reasons for the tradition. The execution of the protocol is composed of two consecutive phases: the initial phase and the maintenance phase. The initial phase aims to authenticate the user into the system and establish the session with the web service. During the maintenance phase, the session timeout is adaptively updated when user identity verification is performed using fresh raw data provided by the client to the CASHMA authentication server. The user (the client) contactstheweb service for a service request; the web service replies that a valid certificate from the CASHMA authentication service is required for authentication. VI. CONCLUSIONS: Session administration framework is completely in view of username and watchword, and sessions are ended by unequivocal logouts or by the termination of session timeouts. Techniques utilized for persistent confirmation utilizing diverse biometrics. Introductory one time login confirmation is deficient to addressthe hazardengagedwith post signed in session. We misused the novel probability acquainted by biometrics with characterize a conventionfor consistent verification that enhances securityandeaseofuse of client session. The convention figures versatile timeouts on the premise of the put stock in postured in the client movement and in the quality and sort of biometric information gained straightforwardly through observing in foundation the client's activities. Constant confirmation check with multi - modular biometricsenhancessecurityand ease of use of client session. The capacities proposed for the assessment of the session timeout are chosen among a huge arrangement of conceivable options. REFERENCES: [1] CASHMA-Context Aware Security by Hierarchical Multilevel Architectures, MIUR FIRB, 2005. [2] Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, Paolo Lollini, Angelo Marguglio, AndreaBondavalli ”Continuous and Transparent User Identity Verification for Secure Internet Services” IEEE Transaction on De-pendable and Secure Computing, VOL. 12,NO. 3,JUNE 2015 [3] Anil K. Jain, Sharath Pankanti, Salil Prabhakar, Lin Hong, Arun Ross, James L. Wayman, ”Biometrics: A Grand Challenge” International ConferenceonPatternRecognition, Aug 2004. [4] T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, “ContinuousVerification UsingMultimodalBiometrics,”IEEE Trans. Pattern Analysisand Machine Intelligence, vol.29,no. 4, pp. 687-700, Apr. 2007. [5] T.F. Dapp, “Growing Need for Security in Online Banking: Biometrics Enjoy Remarkable Degree of Acceptance,,” Banking & Technology Snapshot, DB Research, Feb. 2012. [6] A. Ceccarelli, A. Bondavalli, F. Brancati, and E. La Mattina, “Improving Security of Internet ServicesthroughContinuous and Transparent User Identity Verification,”Proc.Int’lSymp. Reliable Distributed Systems(SRDS), pp.201-206,Oct.2012. [7] L. Montecchi, P. Lollini, A. Bondavalli, and E. La Mattina, “Quantitative Security Evaluation of a Multi-Biometric Authentication System,” Proc. Int’l Conf. Computer Safety, Reliability and Security, pp. 209-221, 2012. [8] S. Kumar, T. Sim, R. Janakiraman, and S. Zhang, “Using Continuous Biometric Verification to Protect Interactive Login Sessions,” Proc. 21st Ann. Computer Security Applications Conf. (ACSAC ’05), pp. 441-450, 2005. [9] Biometric System Base Secure AuthenticationServicefor Session Management Nilima Deore, Prof. C.R.Barde International Journal of Innovative Research in Computer and Communication Engineering Vol. 3, Issue 12, December 2015.
Download now