RMIT University
Browse

Correlation keystroke verification scheme for user access control in cloud computing environment

journal contribution
posted on 2024-11-01, 11:45 authored by Kai Xi, Yan Tang, Jiankun Hu
Cloud security is a major concern that may delay its widespread adoption. User access control (UAC) is the core component of security in cloud computing environment, aiming to ensure that stored data are allowed to be accessed only by authenticated/authorized users. As a typical behavioural biometrics, keystroke dynamics provides a promising UAC solution. The most challenging issue that hinders the wide deployment of keystroke is the high verification error rate. Gunetti et al. proposed a classical n-graph-based keystroke verification method (GP method), which can achieve a low False Acceptance Rate (FAR). However, the GP method suffers from a high False Rejection Rate (FRR) and a severe scalability issue.

History

Journal

Computer Journal

Volume

54

Issue

10

Start page

1632

End page

1644

Total pages

13

Publisher

Oxford University Press

Place published

United Kingdom

Language

English

Copyright

© The Author 2011

Former Identifier

2006032398

Esploro creation date

2020-06-22

Fedora creation date

2015-01-16

Usage metrics

    Scholarly Works

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC