Mobile user authentication system in cloud environment

被引:3
|
作者
Yeh, Her-Tyan [1 ]
Chen, Bing-Chang [1 ]
Wu, Yi-Cong [1 ]
机构
[1] Southern Taiwan Univ Sci & Technol, Dept Informat & Commun, Tainan, Taiwan
关键词
voiceprint identification; one-time password; CAPTCHA; visual cryptography; Cloud;
D O I
10.1002/sec.688
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to reach a safe environment that can be automatically used on the Internet and to take precautions against the Internet fishing attack, the system integrates some features including one-time password, Completely Automated Public Turing Test to tell Computers and Humans Apart, voiceprint identification of creatural features, and visual cryptography, designing a formula wherein users do not need to remember any accounts and passwords when they surf the Internet through mobile devices, and it aims at smart phones and the Cloud. The formula is able to improve the problems of rampant Internet fishing and the management of passwords. In techniques, on one hand, it uses PIN information visual passwords in cell phones to improve the security of the account; on the other hand, it uses voiceprint identification features so that the system center can ensure the user's identification with a view to improve the leak in mobile devices rather than only to check mobile devices. And then, it utilizes the voiceprint, which we use when we log in, to produce a one-time password that is able to lower the risk of the account and passwords being attacked by Internet fishing. Through the frame of this research, it can protect our cell phones from being lost and embezzled and can prevent the account and passwords from being attacked by Internet fishing. It can also solve the problem of users forgetting accounts and passwords, and reduce the operational burden of cell phones. Besides, it is capable of preventing the Cloud servers from incurring many malicious registrations and logins, keeping them working efficiently. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1161 / 1168
页数:8
相关论文
共 50 条
  • [31] Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System
    Siddiqui, Zeeshan
    Abdullah, Abdul Hanan
    Khan, Muhammad Khurram
    Alghamdi, Abdullah S.
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (01)
  • [32] A heterogeneous user authentication and key establishment for mobile client–server environment
    Fagen Li
    Jiye Wang
    Yuyang Zhou
    Chunhua Jin
    SK Hafizul Islam
    [J]. Wireless Networks, 2020, 26 : 913 - 924
  • [33] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [34] User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment
    Li, Peng
    Yang, Cheng
    Xu, He
    Lau, Ting Fung
    Wang, Ruchuan
    [J]. PARALLEL ARCHITECTURE, ALGORITHM AND PROGRAMMING, PAAP 2017, 2017, 729 : 59 - 69
  • [35] User authentication method design based on biometrics in a multi-cloud environment
    Song, Seokhwa
    Lee, Jae Seung
    Lee, Jaesik
    Jun, Moon-Seog
    [J]. Lecture Notes in Electrical Engineering, 2015, 373 : 283 - 288
  • [36] Design of Security Policy Based on User Identity Authentication Technology in Cloud Environment
    Duan, Hongxiu
    Qin, Jun
    Dai, Yuan
    [J]. 2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL AUTOMATION (ICITIA 2017), 2017, : 148 - 155
  • [37] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Saru Kumari
    Fan Wu
    Shehzad Ashraf Chaudhry
    R. Niranchana
    [J]. Mobile Networks and Applications, 2019, 24 : 1046 - 1062
  • [38] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Kumari, Saru
    Wu, Fan
    Chaudhry, Shehzad Ashraf
    Niranchana, R.
    [J]. MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 1046 - 1062
  • [39] A Context-Aware Authentication System for Mobile Cloud Computing
    Benzekki, Kamal
    El Fergougui, Abdeslam
    ElBelrhiti ElAlaoui, Abdelbaki
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 : 379 - 387
  • [40] A heterogeneous user authentication and key establishment for mobile client-server environment
    Li, Fagen
    Wang, Jiye
    Zhou, Yuyang
    Jin, Chunhua
    Islam, S. K. Hafizul
    [J]. WIRELESS NETWORKS, 2020, 26 (02) : 913 - 924