A Systematic Approach for a Secure Authentication System
- 30 July 2021
- journal article
- Published by Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP in International Journal of Soft Computing and Engineering
- Vol. 10 (6), 7-11
- https://doi.org/10.35940/ijsce.f3508.0710621
Abstract
Authentication is a process of verifying the credibility of a user who is trying to access classified or confidential information. There is a vast unfold in the number of internet users, and the demand for IoT devices, cloud services has been increasing; it is now essential more than ever to protect the data hosted on the internet. So, the authentication process cannot be relied on single-factor static authentication methods to verify the user credentials. All devices in the market are not equipped with biometric systems, so a form of multi-factor authentication which is independent of biometrics needs to be adopted for a secure authentication system. This paper portraits a systematic architecture to verify user credentials using specific parameters, trying to unfold patterns using machine learning algorithms based on user's past login records, thus trying to provide a safer and secure authentication process for the users.Keywords
This publication has 9 references indexed in Scilit:
- Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the WildPublished by Springer Science and Business Media LLC ,2019
- Risk-based authenticator for web applicationsPublished by Association for Computing Machinery (ACM) ,2016
- Who Are You? A Statistical Approach to Measuring User AuthenticityPublished by Internet Society ,2016
- Statistics on Password Re-use and Adaptive Strength for Financial AccountsLecture Notes in Computer Science, 2014
- Real Time Online Banking Fraud Detection Using Location InformationCommunications in Computer and Information Science, 2011
- Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access ControlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Risk assessment in distributed authorizationPublished by Association for Computing Machinery (ACM) ,2005
- Risk Models for Trust-Based Access Control(TBAC)Lecture Notes in Computer Science, 2005
- Improving system security via proactive password checkingComputers & Security, 1995