{"title":"Zero-Trust Model of Cybersecurity: A Significant Challenge in the Future","authors":"Fadi Al-Ayed","doi":"10.1109/CSCI54926.2021.00200","DOIUrl":null,"url":null,"abstract":"To address future cybersecurity challenges, this paper proposes a real-time three-factor authentication scheme (RT3FA). The proposed model integrates the characteristics of multi-factor authentication and real-time actual information. The additional layer of protection raises the obstacles for data access; face biometric is needed in addition to two-factor authentication. Facial biometric is accomplished by synchronizing real-time information with feature recognition via an instantaneous live feed from the user’s camera. However, the improved protection may cause efficiency issues and thus, require higher capacities for both the user’s device and the database system.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCI54926.2021.00200","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
To address future cybersecurity challenges, this paper proposes a real-time three-factor authentication scheme (RT3FA). The proposed model integrates the characteristics of multi-factor authentication and real-time actual information. The additional layer of protection raises the obstacles for data access; face biometric is needed in addition to two-factor authentication. Facial biometric is accomplished by synchronizing real-time information with feature recognition via an instantaneous live feed from the user’s camera. However, the improved protection may cause efficiency issues and thus, require higher capacities for both the user’s device and the database system.