Abstract
In this paper, we propose an effective algorithm called multi-cross template matching using fast dynamic time warping (MuCFdTW) and is used in authentication and data security through gait based encryption, in mobile cloud services. MuCFdTW improves the authentication of the user in lesser time with an accuracy of more than 99%. The data flow between the mobile device and cloud server is secured through encryption using Organization ID and private key. These keys are derived from the parameters of Gait cyclic patterns, which enhances the security by double fold. This framework effectively addresses the efficiency limitations of public key generation and computational overhead. It also removes the revocation issues as the access of the users will be automatically revoked as they move out of the organization sites. Experimental results and comparison reveals that false positive rate is better compared to other existing identity based systems with encryption and decryption time ranging from 3 to 5 ms and the time taken is comparatively less ranging from 3.4 \({\pm }\) 0.5%.
Similar content being viewed by others
References
Huang, D.: Mobile cloud computing. IEEE COMSOC Multimed. Commun. Tech. Comm. E-Lett. 6(10), 27–31 (2011)
A survey of mobile cloud computing: architecture, applications, and approaches, WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. (2011), Wiley (wileyonlinelibrary.com). doi:10.1002/wcm.1203
Merlin, S. S., Chandrasekar, A.: Risk management in cloud: a systematic approach and analysis. In: Proceedings of the International Journal of Printing, Packaging & Allied Sciences, vol. 6. (2016)
Breitinger, F., Nickel, C.: User survey on phone security and usage, pp. 139–144. BIOSIG, Minneapolis (2010)
Tang, J., Terziyan, V., Veijalainen, J.: Distributed PIN verification scheme for improving security of mobile devices. J. Mob. Netw. Appl. 8(2), 159–175 (2003)
NTA Monitor Password Survey, NTA Monitor. http://www.silicon.com/a56760 (2002)
Su, Q., Tian, J., Chen, X., Yang, X.: A fingerprint authentication system based on mobile phone: In: Proceedings of the 5th International Conference on Audio- and Video-Based Person Authentication (2005)
Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1), 1–5 (2010)
Gafurov, D., Helkala, K., et al.: Biometric gait authentication using accelerometer sensor. J. Comput. 1(7), 51–59 (2006)
Zhang, Y., Pan, G., Jia, K., Lu, M., Wang, Y., Wu, Z.: Accelerometer-based gait recognition by sparse representation of signature points with clusters. IEEE Trans. Cybern. (2014), doi:10.1109/TCYB.2014.2361287
Hoang, T., Nguyen, T.D., et al.: Adaptive cross-device gait recognition using a mobile accelerometer. J. Inf. Process. Syst. 9(2), 333 (2013)
Boneh, D. Boyen, X.: Efficient selective-ID identity based encryption without random oracles. In: Cachin, E. (eds.)Proceedings of Eurocrypt, pp. 223–38. Springer, Heidelberg (2004)
Shamir, A.: Identity-based cryptosystems and signature schemes. Adv. Cryptol. 196, 47–53 (1985)
Boneh, D., Franklin, M.: Identity based encryption from the weil pairing. Adv. Cryptol. 2139, 213–229 (2001)
Boneh, D.: Generalized identity based and broadcast encryption schemes. Lect. Notes Comput. Sci. 5350, 455–470 (2008)
Sun, Y., Z, C., Zhang, Y.C., Fang, Y.G.: An identity-based security system for user privacy in vehicular Ad Hoc networks. IEEE Transact. Parall. Distrib. Syst. 21(9), 1227–1239 (2010)
Sun, J.Y., Z, C., Zhang, Y.C., Fang, Y.G.: Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Transact. Vehic. Technol. 58(7), 3508–3517 (2009)
Goyal, V.: Certificate revocation using fine grained certificate space partitioning, in Financial Cryptography and Data Security. In: Dietrich, S., Dhamija, R. (eds.) Lecture Notes in Computer Science. Springer, Berlin (2007)
Li, J., Chen, X., Jia, C., Lou, W.: Identity-based Encryption with Outsourced Revocation in Cloud Computing. IEEE Transact. Comput. 64(2), 425–437 (2015)
Merlin, S.S., Chandrasekar, A.: A novel framework for user authentication and data security in mobile cloud using gait, in Middle-East. J. Sci. Res. 24, 3755–3762 (2016)
Qin, B., et al.: Simultaneous authentication and secrecy in identity-based data upload to cloud. Clust. Comput. 16, 845–859 (2013)
Thang, M.H. et al.: Gait identification using accelerometer on mobile phone Control. In: Proceedings of the International Conference on Automation and Information Sciences (ICCAIS), (2012)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Merlin, S.S., Chandrasekar, A. Towards mobile cloud authentication and gait based security using time warping technique. Cluster Comput 22 (Suppl 5), 10595–10604 (2019). https://doi.org/10.1007/s10586-017-1136-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1136-5