amazon

Thursday, August 13, 2015

Continuous and Transparent User Identity Verification for Secure Internet Services

Continuous and Transparent User Identity

Verification for Secure Internet Services


ABSTRACT:
            Session management in distributed Internet services is traditionally based on username and password, explicit logouts and mechanisms of user session expiration using classic timeouts. Emerging biometric solutions allow substituting username and password with biometric data during session establishment, but in such an approach still a single verification is deemed sufficient, and the identity of a user is considered immutable during the entire session. Additionally, the length of the session timeout may impact on the usability of the service and consequent client satisfaction. This paper explores promising alternatives offered by applying biometrics in the management of sessions. A secure protocol is defined for perpetual authentication through continuous user verification. The protocol determines adaptive timeouts based on the quality, frequency and type of biometric data transparently acquired from the user. The functional behavior of the protocol is illustrated through Matlab simulations, while model-based quantitative analysis is carried out to assess the ability of the protocol to contrast security attacks exercised by different kinds of attackers. Finally, the current prototype for PCs and Android smartphones is discussed.

ARCHITECTURE:














HARDWARE REQUIREMENTS:
·      System :         Pentium IV 2.4 GHz.
·      Hard Disk :         40 GB.
·      Floppy Drive : 44 Mb.
·      Monitor : 15 VGA Colour.
·      Mouse :
·      Ram : 512 Mb.
·      MOBILE : ANDROID
SOFTWARE REQUIREMENTS:
·      Operating system : Windows 7.
·      Coding Language : Java 1.7
·      Tool Kit : Android 2.3 ABOVE
·      IDE : Eclipse


No comments:

Post a Comment