Gaze-based Authentication in Cloud Computing

IJCA Proceedings on Recent Trends in Future Prospective in Engineering and Management Technology
© 2016 by IJCA Journal
RTFEM 2016 - Number 1
Year of Publication: 2016
Ayushi Gahlot
Umesh Gupta

Ayushi Gahlot and Umesh Gupta. Article: Gaze-based Authentication in Cloud Computing. IJCA Proceedings on Recent Trends in Future Prospective in Engineering and Management Technology RTFEM 2016(1):14-20, July 2016. Full text available. BibTeX

	author = {Ayushi Gahlot and Umesh Gupta},
	title = {Article: Gaze-based Authentication in Cloud Computing},
	journal = {IJCA Proceedings on Recent Trends in Future Prospective in Engineering and Management Technology},
	year = {2016},
	volume = {RTFEM 2016},
	number = {1},
	pages = {14-20},
	month = {July},
	note = {Full text available}


This paper covers the basics of cloud computing, major challenges, need for new security models, and focuses on eye-gaze based authentication technique to secure the critical information stored on cloud. The paper provides an approach for implementation of gaze technology in cloud computing. The gaze-based authentication model involves the concepts of neural networks, Image processing, gaze estimation and feature detection along with the cryptographic concepts.


  • D. Catteddu and G. Hogben. Cloud Computing: Ben¬efits, Risks and Recommendations for Information Se¬curity. ENISA, 2009.
  • H. Takabi, J. B. D. Joshi, and G. -J. Ahn. SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. Proc. 1st IEEE Int'l Workshop Emerging Applications for Cloud Computing, IEEE CS Press, 2010, pp. 393–398.
  • Bonneau, J. , Herley, C. , van Oorschot, P. , and Stajano, F. ,The quest to replace passwords: A framework for comparative evaluation of web authentication schemes, IEEE Symposium on Security and Privacy (SP), 2012, pages 553-567.
  • Phiri, J. , Zhao, T. -J. , and Agbinya, J. , Biometrics, device metrics and pseudo metrics in a multifactor authentication with artificial intelligence, 6th International Conference on Broadband and Biomedical Communications (IB2Com), 2011, pages 157-162
  • Maeder, A. J. and Fookes, C. B. , A visual attention approach to personal identification. In Faculty of Built Environment and Engineering; School of Engineering Systems, 2003, pages 1-7.
  • Yang, C. , Sun, J. , Liu, J. , Yang, X. , Wang, D. , and Liu, W, A gray difference-based pre-processing for gaze tracking, IEEE 10th International Conference on Signal Processing (ICSP), 2010, pages 1293-1296.
  • Liang, Z. , Tan, F. , and Chi, Z. , Video-based biometric identification using eye tracking technique, IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC), 2012, pages 728-733.
  • Corcoran, P. , Nanu, F. , Petrescu, S. , and Bigioi, P. , Real-time eye gaze tracking for gaming design and consumer electronics systems. IEEE Transactions on Consumer Electronics, 2012, pages 347-355.
  • Mei, Z. , Liu, J. , Li, Z. , and Yang, L. Study of the eye-tracking methods based on video, Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), 2011, pages 1-5.
  • Viola, P. and Jones, M. , Rapid object detection using a boosted cascade of simple features. In Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2001, volume 1, pages I-511-I-518 vol. 1.
  • Viola, P. and Jones, M. , Robust real-time face detection. In Eighth IEEE International Conference on Computer Vision, 2001. ICCV 2001. Proceedings, volume 2, pages 747-747.
  • Majumder, A. , Behera, L. , and Subramanian, V. Automatic and robust detection of facial features in frontal face images. In UkSim 13th International Conference on Computer Modelling and Simulation (UKSim),2011, pages 331-336.
  • De Luca, A. , Weiss, R. , and Drewes, H. , Evaluation of eye-gaze interaction methods for security enhanced PIN-entry. In Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces, 2007, page 199202, New York, NY, USA. ACM.
  • Xiaoyuan, S. , Z. Ying, et al. ,Graphical passwords: a survey. Computer Security Applications Conference, 21st Annual,2005.
  • Wei-Chi, K. and T. Maw-Jinn,A Remote User Authentication Scheme Using Strong Graphical Passwords. Local Computer Networks, 2005. 30th Anniversary.
  • Masrom, M. , F. Towhidi, et al. , Pure and cued recall-based graphical user authentication. Application of Information and Communication Technologies, 2009. AICT 2009. International Conference.
  • S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, N. Memon. PassPoints: Design and longitudinal evaluation of a graphical password system. International J. of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security), 63 (2005) 102-127.
  • Almuairfi, S. , Veeraraghavan, P. , and Chilamkurti, N. , IPAS: implicit password authentication system. In IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA), 2011, pages 430-435.
  • D. V. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. Proc. Second USENIX Workshop Security, 1990.
  • Huang, X. , Xiang, Y. , Chonka, A. , Zhou, J. , and Deng, R. -H. , A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 2011,pages 1390-1397.
  • Freier, A. O. , Karlton, P. , Kocher, P. C. The SSL Protocol, Version 3. 0. INTERNETDRAFT (November 1996)
  • Mao, W. B. : An Identity-based Non- interactive Authentication Framework for Computational Grids, May 29 (2004)
  • Lim, H. W. , Robshaw, M. : A dynamic key infrastructure for GRID. In: Sloot, P. M. A. , Hoekstra, A. G. , Priol, T. , Reinefeld, A. , Bubak, M. (eds. ) EGC , LNCS, vol. 3470, pp. 255–264. Springer, Heidelberg (2005)
  • Hongwei Li, Yuanshun Dai, Ling Tian, Haomiao Yang. Identity-Based Authentication for Cloud Computing, M. G. Jaatun, G. Zhao, and C. Rong (Eds. ): CloudCom , LNCS 5931, pp. 157–166, 2009. © Springer-Verlag Berlin Heidelberg.
  • Mao, Z. , Florencio, D. , and Herley, C. , Painless migration from passwords to two factor authentication. In IEEE International Workshop on Information Forensics and Security (WIFS),2011, pages 1-6.