CFP last date
20 March 2024
Reseach Article

Gaze-based Authentication in Cloud Computing

Published on July 2016 by Ayushi Gahlot, Umesh Gupta
Recent Trends in Future Prospective in Engineering and Management Technology
Foundation of Computer Science USA
RTFEM2016 - Number 1
July 2016
Authors: Ayushi Gahlot, Umesh Gupta
45a32089-3189-4d23-9328-ed5c946177c5

Ayushi Gahlot, Umesh Gupta . Gaze-based Authentication in Cloud Computing. Recent Trends in Future Prospective in Engineering and Management Technology. RTFEM2016, 1 (July 2016), 14-20.

@article{
author = { Ayushi Gahlot, Umesh Gupta },
title = { Gaze-based Authentication in Cloud Computing },
journal = { Recent Trends in Future Prospective in Engineering and Management Technology },
issue_date = { July 2016 },
volume = { RTFEM2016 },
number = { 1 },
month = { July },
year = { 2016 },
issn = 0975-8887,
pages = { 14-20 },
numpages = 7,
url = { /proceedings/rtfem2016/number1/25481-5112/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Recent Trends in Future Prospective in Engineering and Management Technology
%A Ayushi Gahlot
%A Umesh Gupta
%T Gaze-based Authentication in Cloud Computing
%J Recent Trends in Future Prospective in Engineering and Management Technology
%@ 0975-8887
%V RTFEM2016
%N 1
%P 14-20
%D 2016
%I International Journal of Computer Applications
Abstract

This paper covers the basics of cloud computing, major challenges, need for new security models, and focuses on eye-gaze based authentication technique to secure the critical information stored on cloud. The paper provides an approach for implementation of gaze technology in cloud computing. The gaze-based authentication model involves the concepts of neural networks, Image processing, gaze estimation and feature detection along with the cryptographic concepts.

References
  1. D. Catteddu and G. Hogben. Cloud Computing: Ben¬efits, Risks and Recommendations for Information Se¬curity. ENISA, 2009.
  2. H. Takabi, J. B. D. Joshi, and G. -J. Ahn. SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. Proc. 1st IEEE Int'l Workshop Emerging Applications for Cloud Computing, IEEE CS Press, 2010, pp. 393–398.
  3. Bonneau, J. , Herley, C. , van Oorschot, P. , and Stajano, F. ,The quest to replace passwords: A framework for comparative evaluation of web authentication schemes, IEEE Symposium on Security and Privacy (SP), 2012, pages 553-567.
  4. Phiri, J. , Zhao, T. -J. , and Agbinya, J. , Biometrics, device metrics and pseudo metrics in a multifactor authentication with artificial intelligence, 6th International Conference on Broadband and Biomedical Communications (IB2Com), 2011, pages 157-162
  5. Maeder, A. J. and Fookes, C. B. , A visual attention approach to personal identification. In Faculty of Built Environment and Engineering; School of Engineering Systems, 2003, pages 1-7.
  6. Yang, C. , Sun, J. , Liu, J. , Yang, X. , Wang, D. , and Liu, W, A gray difference-based pre-processing for gaze tracking, IEEE 10th International Conference on Signal Processing (ICSP), 2010, pages 1293-1296.
  7. Liang, Z. , Tan, F. , and Chi, Z. , Video-based biometric identification using eye tracking technique, IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC), 2012, pages 728-733.
  8. Corcoran, P. , Nanu, F. , Petrescu, S. , and Bigioi, P. , Real-time eye gaze tracking for gaming design and consumer electronics systems. IEEE Transactions on Consumer Electronics, 2012, pages 347-355.
  9. Mei, Z. , Liu, J. , Li, Z. , and Yang, L. Study of the eye-tracking methods based on video, Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), 2011, pages 1-5.
  10. Viola, P. and Jones, M. , Rapid object detection using a boosted cascade of simple features. In Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2001, volume 1, pages I-511-I-518 vol. 1.
  11. Viola, P. and Jones, M. , Robust real-time face detection. In Eighth IEEE International Conference on Computer Vision, 2001. ICCV 2001. Proceedings, volume 2, pages 747-747.
  12. Majumder, A. , Behera, L. , and Subramanian, V. Automatic and robust detection of facial features in frontal face images. In UkSim 13th International Conference on Computer Modelling and Simulation (UKSim),2011, pages 331-336.
  13. De Luca, A. , Weiss, R. , and Drewes, H. , Evaluation of eye-gaze interaction methods for security enhanced PIN-entry. In Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces, 2007, page 199202, New York, NY, USA. ACM.
  14. Xiaoyuan, S. , Z. Ying, et al. ,Graphical passwords: a survey. Computer Security Applications Conference, 21st Annual,2005.
  15. Wei-Chi, K. and T. Maw-Jinn,A Remote User Authentication Scheme Using Strong Graphical Passwords. Local Computer Networks, 2005. 30th Anniversary.
  16. Masrom, M. , F. Towhidi, et al. , Pure and cued recall-based graphical user authentication. Application of Information and Communication Technologies, 2009. AICT 2009. International Conference.
  17. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, N. Memon. PassPoints: Design and longitudinal evaluation of a graphical password system. International J. of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security), 63 (2005) 102-127.
  18. Almuairfi, S. , Veeraraghavan, P. , and Chilamkurti, N. , IPAS: implicit password authentication system. In IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA), 2011, pages 430-435.
  19. D. V. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. Proc. Second USENIX Workshop Security, 1990.
  20. Huang, X. , Xiang, Y. , Chonka, A. , Zhou, J. , and Deng, R. -H. , A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 2011,pages 1390-1397.
  21. Freier, A. O. , Karlton, P. , Kocher, P. C. The SSL Protocol, Version 3. 0. INTERNETDRAFT (November 1996)
  22. Mao, W. B. : An Identity-based Non- interactive Authentication Framework for Computational Grids, May 29 (2004)
  23. Lim, H. W. , Robshaw, M. : A dynamic key infrastructure for GRID. In: Sloot, P. M. A. , Hoekstra, A. G. , Priol, T. , Reinefeld, A. , Bubak, M. (eds. ) EGC , LNCS, vol. 3470, pp. 255–264. Springer, Heidelberg (2005)
  24. Hongwei Li, Yuanshun Dai, Ling Tian, Haomiao Yang. Identity-Based Authentication for Cloud Computing, M. G. Jaatun, G. Zhao, and C. Rong (Eds. ): CloudCom , LNCS 5931, pp. 157–166, 2009. © Springer-Verlag Berlin Heidelberg.
  25. Mao, Z. , Florencio, D. , and Herley, C. , Painless migration from passwords to two factor authentication. In IEEE International Workshop on Information Forensics and Security (WIFS),2011, pages 1-6.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Iaas Paas Saas Static Dynamic Gaze Estimation Image Processing Feature Detection Hough Transform.