Skip to main content
Log in

Towards mobile cloud authentication and gait based security using time warping technique

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

In this paper, we propose an effective algorithm called multi-cross template matching using fast dynamic time warping (MuCFdTW) and is used in authentication and data security through gait based encryption, in mobile cloud services. MuCFdTW improves the authentication of the user in lesser time with an accuracy of more than 99%. The data flow between the mobile device and cloud server is secured through encryption using Organization ID and private key. These keys are derived from the parameters of Gait cyclic patterns, which enhances the security by double fold. This framework effectively addresses the efficiency limitations of public key generation and computational overhead. It also removes the revocation issues as the access of the users will be automatically revoked as they move out of the organization sites. Experimental results and comparison reveals that false positive rate is better compared to other existing identity based systems with encryption and decryption time ranging from 3 to 5 ms and the time taken is comparatively less ranging from 3.4 \({\pm }\) 0.5%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Huang, D.: Mobile cloud computing. IEEE COMSOC Multimed. Commun. Tech. Comm. E-Lett. 6(10), 27–31 (2011)

    Google Scholar 

  2. A survey of mobile cloud computing: architecture, applications, and approaches, WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. (2011), Wiley (wileyonlinelibrary.com). doi:10.1002/wcm.1203

  3. Merlin, S. S., Chandrasekar, A.: Risk management in cloud: a systematic approach and analysis. In: Proceedings of the International Journal of Printing, Packaging & Allied Sciences, vol. 6. (2016)

  4. Breitinger, F., Nickel, C.: User survey on phone security and usage, pp. 139–144. BIOSIG, Minneapolis (2010)

    Google Scholar 

  5. Tang, J., Terziyan, V., Veijalainen, J.: Distributed PIN verification scheme for improving security of mobile devices. J. Mob. Netw. Appl. 8(2), 159–175 (2003)

    Article  Google Scholar 

  6. NTA Monitor Password Survey, NTA Monitor. http://www.silicon.com/a56760 (2002)

  7. Su, Q., Tian, J., Chen, X., Yang, X.: A fingerprint authentication system based on mobile phone: In: Proceedings of the 5th International Conference on Audio- and Video-Based Person Authentication (2005)

  8. Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1), 1–5 (2010)

  9. Gafurov, D., Helkala, K., et al.: Biometric gait authentication using accelerometer sensor. J. Comput. 1(7), 51–59 (2006)

    Article  Google Scholar 

  10. Zhang, Y., Pan, G., Jia, K., Lu, M., Wang, Y., Wu, Z.: Accelerometer-based gait recognition by sparse representation of signature points with clusters. IEEE Trans. Cybern. (2014), doi:10.1109/TCYB.2014.2361287

  11. Hoang, T., Nguyen, T.D., et al.: Adaptive cross-device gait recognition using a mobile accelerometer. J. Inf. Process. Syst. 9(2), 333 (2013)

    Article  Google Scholar 

  12. Boneh, D. Boyen, X.: Efficient selective-ID identity based encryption without random oracles. In: Cachin, E. (eds.)Proceedings of Eurocrypt, pp. 223–38. Springer, Heidelberg (2004)

  13. Shamir, A.: Identity-based cryptosystems and signature schemes. Adv. Cryptol. 196, 47–53 (1985)

    Article  MathSciNet  Google Scholar 

  14. Boneh, D., Franklin, M.: Identity based encryption from the weil pairing. Adv. Cryptol. 2139, 213–229 (2001)

    MathSciNet  MATH  Google Scholar 

  15. Boneh, D.: Generalized identity based and broadcast encryption schemes. Lect. Notes Comput. Sci. 5350, 455–470 (2008)

    Article  MathSciNet  Google Scholar 

  16. Sun, Y., Z, C., Zhang, Y.C., Fang, Y.G.: An identity-based security system for user privacy in vehicular Ad Hoc networks. IEEE Transact. Parall. Distrib. Syst. 21(9), 1227–1239 (2010)

    Article  Google Scholar 

  17. Sun, J.Y., Z, C., Zhang, Y.C., Fang, Y.G.: Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Transact. Vehic. Technol. 58(7), 3508–3517 (2009)

    Article  Google Scholar 

  18. Goyal, V.: Certificate revocation using fine grained certificate space partitioning, in Financial Cryptography and Data Security. In: Dietrich, S., Dhamija, R. (eds.) Lecture Notes in Computer Science. Springer, Berlin (2007)

    Google Scholar 

  19. Li, J., Chen, X., Jia, C., Lou, W.: Identity-based Encryption with Outsourced Revocation in Cloud Computing. IEEE Transact. Comput. 64(2), 425–437 (2015)

    Article  MathSciNet  Google Scholar 

  20. Merlin, S.S., Chandrasekar, A.: A novel framework for user authentication and data security in mobile cloud using gait, in Middle-East. J. Sci. Res. 24, 3755–3762 (2016)

    Google Scholar 

  21. Qin, B., et al.: Simultaneous authentication and secrecy in identity-based data upload to cloud. Clust. Comput. 16, 845–859 (2013)

    Article  Google Scholar 

  22. Thang, M.H. et al.: Gait identification using accelerometer on mobile phone Control. In: Proceedings of the International Conference on Automation and Information Sciences (ICCAIS), (2012)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Sengole Merlin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Merlin, S.S., Chandrasekar, A. Towards mobile cloud authentication and gait based security using time warping technique. Cluster Comput 22 (Suppl 5), 10595–10604 (2019). https://doi.org/10.1007/s10586-017-1136-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1136-5

Keywords

Navigation