Advertisement

Authentication Using Dynamic Question Generation

  • Irfan Siddavatam
  • Dhrumin Khatri
  • Pranay Ashar
  • Vineet Parekh
  • Toshkumar Sharma
Chapter
Part of the Studies in Computational Intelligence book series (SCI, volume 771)

Abstract

Privacy and security today are extremely important as we enter the digital age. Authenticating users via passwords has proven to be secure, but flaws still exist. Due to the vast availability and flexibility of password authentication, it is now the most accepted form of user authentication. Intrusion systems, using various techniques, can find ways to break into passwords. Alternate solutions have been proposed, varying from expensive hardware-based authentication to two-phase authentication protocols. We offer an alternative system to authenticate users by extracting social user data available on Facebook and other social media, then generating questions using the collected data and user personality insights. Our mobile application and website are developed using Express Framework, NodeJS, and MongoDB.

Keywords

Authentication Captcha Challenge questions Natural language processing NLP Security 

References

  1. 1.
    OGorman, Lawrence, Amit Bagga, and Jon Bentley. 2004. Financial cryptography. In Call center customer verification by query-directed passwords. Springer: Berlin.  https://doi.org/10.1007/978-3-540-27809-2_6CrossRefGoogle Scholar
  2. 2.
    Furnell, S.M., I. Papadopoulos, and Paul Dowland. 2004. A long-term trial of alternative user authentication technologies. Information Management and Computer Security 12 (2): 178–190.  https://doi.org/10.1108/09685220410530816.CrossRefGoogle Scholar
  3. 3.
    Rabkin, A. 2008. Personal knowledge questions for fallback authentication: Security questions in the era of Facebook. In SOUPS 2008 - Proceedings of the 4th symposium on usable privacy and security, 13–23.Google Scholar
  4. 4.
    Brown, Alex, and Myriam Abramson. 2015. Twitter fingerprints as active authenticators. In 2015 IEEE international conference on data mining workshop (ICDMW), 58-63, Atlantic City, NJ.Google Scholar
  5. 5.
    Nosseir, Ann, Richard Connor, and Karen Renaud. 2006. Question-based group authentication. In Proceedings of the 18th australia conference on computer-human interaction: design: activities, artefacts and environments. ACM.Google Scholar
  6. 6.
    Bachmann, Michael. 2014. Passwords are dead: alternative authentication methods. In 2014 IEEE Joint intelli-gence and security informatics conference (JISIC), IEEE.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Irfan Siddavatam
    • 1
  • Dhrumin Khatri
    • 1
  • Pranay Ashar
    • 1
  • Vineet Parekh
    • 1
  • Toshkumar Sharma
    • 1
  1. 1.K.J. Somaiya College of EngineeringMumbaiIndia

Personalised recommendations