Mobile user authentication system in cloud environment

被引:3
|
作者
Yeh, Her-Tyan [1 ]
Chen, Bing-Chang [1 ]
Wu, Yi-Cong [1 ]
机构
[1] Southern Taiwan Univ Sci & Technol, Dept Informat & Commun, Tainan, Taiwan
关键词
voiceprint identification; one-time password; CAPTCHA; visual cryptography; Cloud;
D O I
10.1002/sec.688
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to reach a safe environment that can be automatically used on the Internet and to take precautions against the Internet fishing attack, the system integrates some features including one-time password, Completely Automated Public Turing Test to tell Computers and Humans Apart, voiceprint identification of creatural features, and visual cryptography, designing a formula wherein users do not need to remember any accounts and passwords when they surf the Internet through mobile devices, and it aims at smart phones and the Cloud. The formula is able to improve the problems of rampant Internet fishing and the management of passwords. In techniques, on one hand, it uses PIN information visual passwords in cell phones to improve the security of the account; on the other hand, it uses voiceprint identification features so that the system center can ensure the user's identification with a view to improve the leak in mobile devices rather than only to check mobile devices. And then, it utilizes the voiceprint, which we use when we log in, to produce a one-time password that is able to lower the risk of the account and passwords being attacked by Internet fishing. Through the frame of this research, it can protect our cell phones from being lost and embezzled and can prevent the account and passwords from being attacked by Internet fishing. It can also solve the problem of users forgetting accounts and passwords, and reduce the operational burden of cell phones. Besides, it is capable of preventing the Cloud servers from incurring many malicious registrations and logins, keeping them working efficiently. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1161 / 1168
页数:8
相关论文
共 50 条
  • [1] Biometric based User Authentication Protocol for Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasalu
    [J]. 2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
  • [2] Efficient user authentication protocol for distributed multimedia mobile cloud environment
    Manojkumar Vivekanandan
    V. N. Sastry
    U. Srinivasulu Reddy
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 1933 - 1956
  • [3] Efficient user authentication protocol for distributed multimedia mobile cloud environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasulu
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (05) : 1933 - 1956
  • [4] User authentication in mobile computing environment
    Takubo, A
    Ishikawa, M
    Watanabe, T
    Soga, M
    Mizuno, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1997, E80A (07) : 1288 - 1298
  • [5] MOBILE-BASED CONTINUOUS USER AUTHENTICATION SYSTEM FOR CLOUD SECURITY
    Li, Qing
    Wang, Le
    Kim, TaeGuen
    Im, Eul Gyu
    [J]. PROCEEDINGS OF 2016 5TH IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2016), 2016, : 176 - 179
  • [6] Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
    Manojkumar Vivekanandan
    Sastry V. N.
    Srinivasulu Reddy U.
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 1572 - 1595
  • [7] Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, Srinivasulu U.
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1572 - 1595
  • [8] User Authentication using Profiling in Mobile Cloud Computing
    Jeong, Hoon
    Choi, Euiin
    [J]. AASRI CONFERENCE ON POWER AND ENERGY SYSTEMS, 2012, 2 : 262 - 267
  • [9] A Study on Authentication System Using QR Code for Mobile Cloud Computing Environment
    Oh, Dong-Sik
    Kim, Bong-Han
    Lee, Jae-Kwang
    [J]. FUTURE INFORMATION TECHNOLOGY, PT 1, 2011, 184 : 500 - +
  • [10] Waving Gesture Analysis for User Authentication in the Mobile Environment
    Shen, Chao
    Wang, Zhao
    Si, Chengxiang
    Chen, Yufei
    Su, Xiaojie
    [J]. IEEE NETWORK, 2020, 34 (02): : 57 - 63