{"title":"Anonymous User Authentication and Implicit Background Checks in Cloud Environment","authors":"Aashi Rastogi, Swadha Vanikar, N. Jeyanthi","doi":"10.1109/ICCMC.2018.8487857","DOIUrl":null,"url":null,"abstract":"Security threats faced by the customer, while storing information on the cloud, are on a continuous hike. Authentication is client's way to claim access to the data stored in the cloud. In our proposed system, we are taking anonymous authentication as an additional feature to the dynamic authentication policy which already exists. Along with the Attribute-Based Signature which serves as the first part of the granting-the-permission process, we use implicit authentication which includes periodic background checks, to ensure that the same legitimate user is using the account and that the account is not hacked or compromised after the login. This is based on a dynamically built user profile. The user profile consists of a set of vectors or features which are used to check whether the device is in the hands of a legitimate user.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"305-309"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487857","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Security threats faced by the customer, while storing information on the cloud, are on a continuous hike. Authentication is client's way to claim access to the data stored in the cloud. In our proposed system, we are taking anonymous authentication as an additional feature to the dynamic authentication policy which already exists. Along with the Attribute-Based Signature which serves as the first part of the granting-the-permission process, we use implicit authentication which includes periodic background checks, to ensure that the same legitimate user is using the account and that the account is not hacked or compromised after the login. This is based on a dynamically built user profile. The user profile consists of a set of vectors or features which are used to check whether the device is in the hands of a legitimate user.