Graphical Semantic Authentication

Authenticate on the system using only the authentication method based on username and password is not enough to ensure an acceptable level of information security for a critical system. It has been used in a multi factor authentication to increase the information security during the authentication process. However factors like what you have cause an inconvenience to the users, because the users during the authentication process always will need to have a device in their possession that complements the authentication process. By the other side of the biometric factor might change during the time, it needs an auxiliary device that will increase the costs and it also might be dependent from environmental conditions to work appropriately. To avoid some problems that exist in multi factor authentication, this work purposes authentication through semantic representation in OWL (web Ontology Language) tuples of recognized concepts in images as a form to increase the security in the authentication process. A proof of the concept was modeled and implemented, it has a demonstration that the robustness of this authentication system depends on the complexity of relationship in the semantic base (ontology) and in the simplicity of the relationship identified in the images.

[1]  Lior Rokach,et al.  Introduction to Information Security , 2012 .

[2]  Panagiotis Germanakos,et al.  The interplay between humans, technology and user authentication: A cognitive processing perspective , 2017, Comput. Hum. Behav..

[3]  Eugenijus Kurilovas,et al.  Creation of Web 2.0 tools ontology to improve learning , 2015, Comput. Hum. Behav..

[4]  Pascal Salembier,et al.  Experimental studies of a graphical authentication system based on semantic categorisation , 2016, IHM.

[5]  Jean-Louis Lanet,et al.  Theoretical Security Evaluation of the Human Semantic Authentication Protocol , 2018, ICETE.

[6]  Frank Stajano,et al.  Passwords and the evolution of imperfect authentication , 2015, Commun. ACM.

[7]  Peter Mikulecký,et al.  Infrastructure Authentication, Authorization and Accounting Solutions for an OpenStack Platform , 2019, MobiWIS.

[8]  Daniel Pacheco Lacerda,et al.  Design Science Research: A Method for Science and Technology Advancement , 2014 .

[9]  Michael S. Bernstein,et al.  Visual Genome: Connecting Language and Vision Using Crowdsourced Dense Image Annotations , 2016, International Journal of Computer Vision.

[10]  Lujo Bauer,et al.  “It's not actually that horrible”: Exploring Adoption of Two-Factor Authentication at a University , 2018, CHI.

[11]  Dan J. Kim,et al.  Exploring Determinants of Semantic Web Technology Adoption from IT Professionals' Perspective: Industry Competition, Organization Innovativeness, and Data Management Capability , 2018, Comput. Hum. Behav..

[12]  Ahmad Almulhem A graphical password authentication system , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).

[13]  Aleksandr Ometov,et al.  Multi-Factor Authentication: A Survey , 2018, Cryptogr..

[14]  William C. Barker Guideline for Identifying an Information System as a National Security System , 2003 .

[15]  Wei Cao,et al.  Network security assessment using a semantic reasoning and graph based approach , 2017, Comput. Electr. Eng..

[16]  Hao Jiang,et al.  Authentication by Encrypted Negative Password , 2019, IEEE Transactions on Information Forensics and Security.

[17]  Jian Ren,et al.  PassBio: Privacy-Preserving User-Centric Biometric Authentication , 2017, IEEE Transactions on Information Forensics and Security.

[18]  Joy M. Perrin A Practical Perspective on Preparation for the Semantic Web , 2017 .

[19]  Krzysztof Joachimiak,et al.  Model for adaptable context-based biometric authentication for mobile devices , 2016, Personal and Ubiquitous Computing.

[20]  Ellis E. Eghan,et al.  Tracing known security vulnerabilities in software repositories - A Semantic Web enabled modeling approach , 2016, Sci. Comput. Program..