Fathima et al., 2024 - Google Patents
An approach to cloud user access control using behavioral biometric-based authentication and continuous monitoringFathima et al., 2024
- Document ID
- 5877847199560772629
- Author
- Fathima A
- Saravanan A
- Publication year
- Publication venue
- International Journal of Advanced Technology and Engineering Exploration
External Links
Snippet
Cloud computing, enabling remote access to services and resources, poses a critical challenge in user authentication and access control, as users can access resources from anywhere with an internet connection. Traditional authentication methods, such as …
- 230000003542 behavioural effect 0 title abstract description 66
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ahvanooey et al. | Modern authentication schemes in smartphones and IoT devices: An empirical survey | |
| Yusop et al. | Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity | |
| Fareed et al. | Privacy-preserving multi-factor authentication and role-based access control scheme for the E-healthcare system | |
| Wang et al. | Cryptanalysis of Three Password‐Based Remote User Authentication Schemes with Non‐Tamper‐Resistant Smart Card | |
| Nimmy et al. | A novel multi-factor authentication protocol for smart home environments | |
| Hurkała et al. | Architecture of context-risk-aware authentication system for web environments | |
| Praveen Kumar et al. | A password less authentication protocol for multi-server environment using physical unclonable function | |
| Khan et al. | A brief review on cloud computing authentication frameworks | |
| Sasikumar et al. | Enhancing cloud security: A multi-factor authentication and adaptive cryptography approach using machine learning techniques | |
| Han et al. | A continuous authentication framework for securing metaverse identities | |
| Wee et al. | Excavating vulnerabilities lurking in multi-factor authentication protocols: A systematic security analysis | |
| Nogia et al. | Multifactor authentication schemes for multiserver based wireless application: a review | |
| Lee et al. | Unconsciously continuous authentication protocol in zero-trust architecture based on behavioral biometrics | |
| Yang et al. | Context-aware phishing-resistant authentication for federated identity in Internet of Things platforms | |
| Abbas et al. | Identifying an OpenID anti‐phishing scheme for cyberspace | |
| Fathima et al. | An approach to cloud user access control using behavioral biometric-based authentication and continuous monitoring | |
| Ruoti et al. | End-to-end passwords | |
| Shakir | User authentication in public cloud computing through adoption of electronic personal synthesis behavior | |
| Eldow et al. | Literature review of authentication layer for public cloud computing: a meta-analysis | |
| Rajamanickam et al. | EAPIOD: ECC based authentication protocol for insider attack protection in IoD scenario | |
| Saravanan et al. | CloudSec (3FA): a multifactor with dynamic click colour-based dynamic authentication for securing cloud environment | |
| Hasan et al. | Authentication techniques in cloud and mobile cloud computing | |
| Gupta et al. | Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications | |
| Vemuri et al. | Insider Attack Detection and Prevention using Server Authentication using Elgamal Encryption | |
| Crihan et al. | Hybrid methods of authentication in network security |