2015
DOI: 10.1002/cpe.3718
|View full text |Cite
|
Sign up to set email alerts
|

Keystroke dynamics‐based user authentication service for cloud computing

Abstract: SUMMARYUser authentication is a crucial requirement for cloud service providers to prove that the outsourced data and services are safe from imposters. Keystroke dynamics is a promising behavioral biometrics for strengthening user authentication, however, current keystroke based solutions designed for certain datasets, for example, a fixed length text typed on a traditional personal computer keyboard and their authentication performances were not acceptable for other input devices nor free length text. Moreove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…such as a security electronic token, a key, trusted device, passport, smart cards, or ID card as an Automatic Teller Machine card (ATM card) [21] [22]. Those physical devices were developed to overcome certain weakness associated with using passwords.…”
Section: Possession-based Authentication Techniquesmentioning
confidence: 99%
“…such as a security electronic token, a key, trusted device, passport, smart cards, or ID card as an Automatic Teller Machine card (ATM card) [21] [22]. Those physical devices were developed to overcome certain weakness associated with using passwords.…”
Section: Possession-based Authentication Techniquesmentioning
confidence: 99%
“…Recently, researchers have proposed different individuallevel identity theft detection methods based on suspicious behavior detection [11], [27]- [33]. However, the efficacy of these methods significantly depends on the sufficiency of behavior records, suffering from the low-quality of behavior records due to data collecting limitations or some privacy issues [3].…”
Section: Introductionmentioning
confidence: 99%
“…Especially, when a method only utilizes a specific dimension of behavioral data, the efficacy damaged by poor data is possibly enlarged. Unfortunately, most existing works just concentrate on a specific dimension of users' behavior, such as keystroke [27], clickstream [30], and user generated content (UGC) [11], [31], [32].…”
Section: Introductionmentioning
confidence: 99%
“…Cloud computing is an emerging paradigm that is considered an alternative to the conventional computing for delivering software, platform, and infrastructure services to customers on demand . Cloud storage services allow the data owner to outsource local data to an online virtualized storage.…”
Section: Introductionmentioning
confidence: 99%