CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Gaze-based Authentication in Cloud Computing

Published on July 2016 by Ayushi Gahlot, Umesh Gupta
Recent Trends in Future Prospective in Engineering and Management Technology
Foundation of Computer Science USA
RTFEM2016 - Number 1
July 2016
Authors: Ayushi Gahlot, Umesh Gupta
45a32089-3189-4d23-9328-ed5c946177c5

Ayushi Gahlot, Umesh Gupta . Gaze-based Authentication in Cloud Computing. Recent Trends in Future Prospective in Engineering and Management Technology. RTFEM2016, 1 (July 2016), 14-20.

@article{
author = { Ayushi Gahlot, Umesh Gupta },
title = { Gaze-based Authentication in Cloud Computing },
journal = { Recent Trends in Future Prospective in Engineering and Management Technology },
issue_date = { July 2016 },
volume = { RTFEM2016 },
number = { 1 },
month = { July },
year = { 2016 },
issn = 0975-8887,
pages = { 14-20 },
numpages = 7,
url = { /proceedings/rtfem2016/number1/25481-5112/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Recent Trends in Future Prospective in Engineering and Management Technology
%A Ayushi Gahlot
%A Umesh Gupta
%T Gaze-based Authentication in Cloud Computing
%J Recent Trends in Future Prospective in Engineering and Management Technology
%@ 0975-8887
%V RTFEM2016
%N 1
%P 14-20
%D 2016
%I International Journal of Computer Applications
Abstract

This paper covers the basics of cloud computing, major challenges, need for new security models, and focuses on eye-gaze based authentication technique to secure the critical information stored on cloud. The paper provides an approach for implementation of gaze technology in cloud computing. The gaze-based authentication model involves the concepts of neural networks, Image processing, gaze estimation and feature detection along with the cryptographic concepts.

References
  1. D. Catteddu and G. Hogben. Cloud Computing: Ben¬efits, Risks and Recommendations for Information Se¬curity. ENISA, 2009.
  2. H. Takabi, J. B. D. Joshi, and G. -J. Ahn. SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. Proc. 1st IEEE Int'l Workshop Emerging Applications for Cloud Computing, IEEE CS Press, 2010, pp. 393–398.
  3. Bonneau, J. , Herley, C. , van Oorschot, P. , and Stajano, F. ,The quest to replace passwords: A framework for comparative evaluation of web authentication schemes, IEEE Symposium on Security and Privacy (SP), 2012, pages 553-567.
  4. Phiri, J. , Zhao, T. -J. , and Agbinya, J. , Biometrics, device metrics and pseudo metrics in a multifactor authentication with artificial intelligence, 6th International Conference on Broadband and Biomedical Communications (IB2Com), 2011, pages 157-162
  5. Maeder, A. J. and Fookes, C. B. , A visual attention approach to personal identification. In Faculty of Built Environment and Engineering; School of Engineering Systems, 2003, pages 1-7.
  6. Yang, C. , Sun, J. , Liu, J. , Yang, X. , Wang, D. , and Liu, W, A gray difference-based pre-processing for gaze tracking, IEEE 10th International Conference on Signal Processing (ICSP), 2010, pages 1293-1296.
  7. Liang, Z. , Tan, F. , and Chi, Z. , Video-based biometric identification using eye tracking technique, IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC), 2012, pages 728-733.
  8. Corcoran, P. , Nanu, F. , Petrescu, S. , and Bigioi, P. , Real-time eye gaze tracking for gaming design and consumer electronics systems. IEEE Transactions on Consumer Electronics, 2012, pages 347-355.
  9. Mei, Z. , Liu, J. , Li, Z. , and Yang, L. Study of the eye-tracking methods based on video, Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), 2011, pages 1-5.
  10. Viola, P. and Jones, M. , Rapid object detection using a boosted cascade of simple features. In Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2001, volume 1, pages I-511-I-518 vol. 1.
  11. Viola, P. and Jones, M. , Robust real-time face detection. In Eighth IEEE International Conference on Computer Vision, 2001. ICCV 2001. Proceedings, volume 2, pages 747-747.
  12. Majumder, A. , Behera, L. , and Subramanian, V. Automatic and robust detection of facial features in frontal face images. In UkSim 13th International Conference on Computer Modelling and Simulation (UKSim),2011, pages 331-336.
  13. De Luca, A. , Weiss, R. , and Drewes, H. , Evaluation of eye-gaze interaction methods for security enhanced PIN-entry. In Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces, 2007, page 199202, New York, NY, USA. ACM.
  14. Xiaoyuan, S. , Z. Ying, et al. ,Graphical passwords: a survey. Computer Security Applications Conference, 21st Annual,2005.
  15. Wei-Chi, K. and T. Maw-Jinn,A Remote User Authentication Scheme Using Strong Graphical Passwords. Local Computer Networks, 2005. 30th Anniversary.
  16. Masrom, M. , F. Towhidi, et al. , Pure and cued recall-based graphical user authentication. Application of Information and Communication Technologies, 2009. AICT 2009. International Conference.
  17. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, N. Memon. PassPoints: Design and longitudinal evaluation of a graphical password system. International J. of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security), 63 (2005) 102-127.
  18. Almuairfi, S. , Veeraraghavan, P. , and Chilamkurti, N. , IPAS: implicit password authentication system. In IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA), 2011, pages 430-435.
  19. D. V. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. Proc. Second USENIX Workshop Security, 1990.
  20. Huang, X. , Xiang, Y. , Chonka, A. , Zhou, J. , and Deng, R. -H. , A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 2011,pages 1390-1397.
  21. Freier, A. O. , Karlton, P. , Kocher, P. C. The SSL Protocol, Version 3. 0. INTERNETDRAFT (November 1996)
  22. Mao, W. B. : An Identity-based Non- interactive Authentication Framework for Computational Grids, May 29 (2004)
  23. Lim, H. W. , Robshaw, M. : A dynamic key infrastructure for GRID. In: Sloot, P. M. A. , Hoekstra, A. G. , Priol, T. , Reinefeld, A. , Bubak, M. (eds. ) EGC , LNCS, vol. 3470, pp. 255–264. Springer, Heidelberg (2005)
  24. Hongwei Li, Yuanshun Dai, Ling Tian, Haomiao Yang. Identity-Based Authentication for Cloud Computing, M. G. Jaatun, G. Zhao, and C. Rong (Eds. ): CloudCom , LNCS 5931, pp. 157–166, 2009. © Springer-Verlag Berlin Heidelberg.
  25. Mao, Z. , Florencio, D. , and Herley, C. , Painless migration from passwords to two factor authentication. In IEEE International Workshop on Information Forensics and Security (WIFS),2011, pages 1-6.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Iaas Paas Saas Static Dynamic Gaze Estimation Image Processing Feature Detection Hough Transform.