A Secure Usability Design System for User Authentication

被引:0
|
作者
Olanrewaju, Ayannuga O. [1 ]
Olusegun, Folorunso [2 ]
Adio, Akinwale T. [2 ]
Asiribo, E. O. [3 ]
机构
[1] Yaba Coll Technol, Dept Comp Technol, Lagos, Nigeria
[2] Univ Agr Abeokuta, Dept Comp Sci, Abeokuta, Ogun State, Nigeria
[3] Univ Agr Abeokuta, Dept Stat, Abeokuta, Ogun State, Nigeria
关键词
Authentication; Graphical Password; Security; Text Password and Usability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The term usable authentication is been brought about as a result of issues surrounding user memorabiilty. Computer users find it less easy to memorize plain text password compared to images or graphics. Researchers have over the years presented several authentication schemes in an effort to provide users with a usable and yet secure authentication system. Authentication and usability are two important terms that to a large extent determines how good a security system is. Secure systems are often needed in many organizations to keep privacy, ensure data safety, among many others. Though it is a necessity for such systems to be very secure but one thing often neglected by most developers is the user. When a system is too secure that it often leads to circumventing of the system by the users, then such a system is not usable. This paper takes a close look at how usability and authentication can be balanced with the use of graphical passwords by presenting an authentication system that combines the use of text based password and graphics based password. The combined strengths of these schemes present computer users with a secure yet usable authentication scheme.
引用
收藏
页码:151 / 158
页数:8
相关论文
共 50 条
  • [41] Security and Usability in Knowledge-based User Authentication: A Review
    Katsini, Christina
    Belk, Marios
    Fidas, Christos
    Avouris, Nikolaos
    Samaras, George
    20TH PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2016), 2016,
  • [42] DEyeAuth: A Secure Smartphone User Authentication System Integrating Eyelid Patterns With Eye Gestures
    Kuang, Ling
    Zeng, Fanzi
    Jiang, Hongbo
    Liu, Daibo
    Li, Jie
    Zheng, Hui
    Zhang, Qibo
    Min, Geyong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (18): : 30069 - 30083
  • [43] A survey on usability and security features in graphical user authentication algorithms
    Lashkari, Arash Habibi
    Farmand, Samaneh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (09): : 195 - 204
  • [44] User perceptions of security, convenience and usability for ebanking authentication tokens
    Weir, Catherine S.
    Douglas, Gary
    Carruthers, Martin
    Jack, Mervyn
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 47 - 62
  • [45] Security And Usability of User Authentication for Fintech Data Protection in Indonesia
    Manggala, Muhammad Purwa
    Wahidah, Ida
    Hanuranto, Ahmad Tri
    2022 INTERNATIONAL CONFERENCE ON DECISION AID SCIENCES AND APPLICATIONS (DASA), 2022, : 546 - 550
  • [46] ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING
    Jiang, Rui
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (04): : 1700 - 1724
  • [47] A secure user authentication scheme using hash functions
    Yoon, Eun-Jun
    Ryu, Eun-Kyung
    Yoo, Kee-Young
    Operating Systems Review (ACM), 2004, 38 (02): : 62 - 68
  • [48] Secure User Authentication in Cloud Computing Management Interfaces
    Soares, Liliana F. B.
    Fernandes, Diogo A. B.
    Freire, Mario M.
    Inacio, Pedro R. M.
    2013 IEEE 32ND INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2013,
  • [49] A study on secure user authentication and authorization in OAuth protocol
    Chae, Cheol-Joo
    Kim, Ki-Bong
    Cho, Han-Jin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1991 - 1999
  • [50] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +