The importance of human dynamics in the future user authentication

Authentication is one of the essential mechanism of a typical security model. It identifies the user legitimacy accessing any service over the network. Authentication can usually be done by a simple single-factor authentication method such as a password. Unfortunately, it is inadequate to ensure security when accessing variant resources and services across the Internet. Therefore, for users to authenticate their identity, there is always a need to work on a different security method that could be used as an extra layer of security can be implemented. This paper presents a human dynamic-based user authentication, relying on the assumption that the actions and interactions of personal, interpersonal, and social factors of a user would be very hard to impersonate. Furthermore, the study includes experiments to help understand human dynamics in dealing with individuals, groups, and societies to be the essential aspects for the new generation user authentication.

[1]  Dipankar Dasgupta,et al.  An Adaptive Approach Towards the Selection of Multi-Factor Authentication , 2015, 2015 IEEE Symposium Series on Computational Intelligence.

[2]  K. L. Man,et al.  The Application of Big Data Analytics in Business World , 2016 .

[3]  Markus Jakobsson,et al.  Implicit Authentication through Learning User Behavior , 2010, ISC.

[4]  Anas Ibrahim,et al.  Innovative Data Authentication Model , 2016, 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).

[5]  Galoh Rashidah Haron,et al.  Adaptive authentication: Issues and challenges , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[6]  Abdelkader Ouda A framework for next generation user authentication , 2016, 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC).

[7]  Muhammad Ali Akbar,et al.  Multi-Factor Authentication on Cloud , 2015, 2015 International Conference on Digital Image Computing: Techniques and Applications (DICTA).

[8]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[9]  Seng-Phil Hong,et al.  A Method of Risk Assessment for Multi-Factor Authentication , 2011, J. Inf. Process. Syst..

[10]  Mario A. R. Dantas,et al.  A2BeST: An adaptive authentication service based on mobile user's behavior and spatio-temporal context , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[11]  Seref Sagiroglu,et al.  Big data: A review , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).

[12]  Tariq Mahmood,et al.  Security Analytics: Big Data Analytics for cybersecurity: A review of trends, techniques and tools , 2013, 2013 2nd National Conference on Information Assurance (NCIA).

[13]  Prabhat Kumar,et al.  A Comprehensive Study on Multifactor Authentication Schemes , 2012, ACITY.

[14]  David Horne,et al.  Human Dynamics : A New Framework for Understanding People and Realizing the Potential in Our Organizations , 1996 .