Mobile Authentication using Hybrid Modalities (MAHM) in Pervasive Computing
Main Article Content
Abstract
Cloud computing facilities using mobile phones has become a necessity more than being an alternative. Cloud storage, social networks and email communications using mobile phones allows for mobility and on the go access to these cloud services. Despite providing such conveniences to the users, cloud access via mobile devices is vulnerable to security breaches especially when a third party gets hold of the mobile phone. A third party may have access to the applications and features of the mobile phone provided that the unauthorized user managed to break the security login of the phone. This gives avenue for the unauthorized user to gain access to the cloud services without further verification. Because most of the cloud services provide a single sign-on features whereby the password is used by cloud services (gmail for example) for the first time only. After the first authentication, an authentication token which is downloaded to the mobile phone is used for subsequent authentications. Although this may sound secure without the use of password, the possibility for an unauthorized user access to the cloud services is still possible because the authentication token is stored in the phone itself and does not require further validations. Moreover, the authentication token is stored as plaintext inside the mobile phone and may be susceptible to security breach. Therefore, an identity management system based on user behavior patterns can be used to further validate the authorized user of the cloud services. The main aim of the research is to design MAHM, for cloud service identity management using human behavior patterns classification. There are various biometrics-based authentication using physiological and psychological have been in place but, environmental and human factors can influence these. In this research, unique behavior patterns will be used to identify distinct characteristics of certain individual. The framework will consist of various user behavior such as keypad tapping behavior, keystroke dynamics and phone swiping behavior as authentication scheme to the cloud applications
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.