Abstract:One of the important challenges in Mobile Cloud Computing (MCC) is related to the authentication of users. There is increasing demand for suitable authentication method for accessing to the shared information via the Internet through Cloud Service Provider (CSP). Personal identification number is the most common mechanism for authentication in mobile devices; however it is not secure way for authenticating users. This work presents a method of authentication which able to identify users based on Keystroke Dyna… Show more
“…An important mechanism category is biometric authentication that examines users by identifying individual features , such as physical characteristics and behaviors . This approach is a complementary support for password‐based verifications, which can provide a secure end users access.…”
“…An important mechanism category is biometric authentication that examines users by identifying individual features , such as physical characteristics and behaviors . This approach is a complementary support for password‐based verifications, which can provide a secure end users access.…”
“…• Keystroke Static authentication (KSA): The user is asked to type several times a fixed text, like a password in order to build his profile or template. During the identification stage, the user is supposed to provide the same string captured during his enrollment to verify if this way of typing matches the model stored or not (Babaeizadeh et al, 2014;Bours & Mondal, 2015) • Keystroke Dynamic authentication (KDA): The user is required to provide a free text to create his templates. It isn't important what he is typing, but how he is typing it, so the user didn't need to remember his password every time when access to the system (Babaeizadeh et al, 2014;Bours & Mondal, 2015) Multimodal Biometric Systems…”
Cloud computing needs a strong and efficient authentication system because the user will access his rented part through a faraway connection and it will make the authentication sensor device besides the user place for identification and verification so how to know the user who claimed himself to be the legal user. Keystroke identification system as a biometric authentication technique is strongly Candidate for the security issues in cloud computing technology. Keystroke dynamics as a security system did not need extra hardware because the authentication device will be the existing keyboard based on everyone has a unique style for writing. The other biometric methods are addressed with each advantage and disadvantage along with keystroke method. In this paper, all known studies about keystroke technique are explained and compared between them according to the classification technique, number of the participated users and each study results then introduces a survey on software and hardware of other biometric authentication techniques and after the literature review is addressed then keystroke as a biometric authentication system is suggested to access cloud computing environment because it has many advantages to being a part of the known security systems which spread in our world.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.