Design and Verification of Privacy and User Re-authentication Systems

dc.contributor.authorJagadeesan, Harinien
dc.contributor.committeechairHsiao, Michael S.en
dc.contributor.committeememberHuang, Chaoen
dc.contributor.committeememberPlassmann, Paul E.en
dc.contributor.departmentElectrical and Computer Engineeringen
dc.date.accessioned2014-03-14T20:35:42Zen
dc.date.adate2009-05-29en
dc.date.available2014-03-14T20:35:42Zen
dc.date.issued2009-04-30en
dc.date.rdate2012-03-30en
dc.date.sdate2009-05-08en
dc.description.abstractIn the internet age, privacy and security have become major concerns since an increasing number of transactions are made over an unsecured network. Thus there is a greater chance for private data to be misused. Further, insider attacks can result in loss of valuable data. Hence there arises a strong need for continual, non-intrusive, quick user re-authentication. Previously, a number of studies have been conducted on authentication using behavioral attributes. Currently, few successful re-authentication mechanisms are available since they use either the mouse or the keyboard for re-authentication and target particular applications. However, successful re-authentication is still dependent on a large number of factors such as user excitation level, fatigue and using just the keyboard or the mouse does not mitigate these factors successfully. Both keyboard and mouse contain valuable, hard-to-duplicate information about the user's behavior. This can be used for analysis and identification of the current user. We propose an application independent system that uses this information for user re-authentication. This system will authenticate the user continually based on his/her behavioral attributes obtained from both the keyboard and mouse operations. This re-authentication system is simple, continual, non-intrusive and easily deployable. To utilize the mouse and keyboard information for re-authentication, we propose a novel heuristic that uses the percentage of mouse-to-keyboard interaction ratio. This heuristic allows us to extract suitable user-behavioral attributes. The extracted data is compared with an already trained database for user re-authentication. The accuracy of the system is calculated by the number of correct identifications to total number of identifications. At present, the accuracy of the system is around 96% for application based user re-authentication and around 82% for application independent user re-authentication. We perform black box, white box testing and Spec# verification procedures that prove the robustness of the proposed system. On testing POCKET, a privacy protection software for children, it was found that the security of POCKET was inadequate at the user level. Our system enhances POCKET security at the user level and ensures that the child's privacy is protected.en
dc.description.degreeMaster of Scienceen
dc.identifier.otheretd-05082009-141351en
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-05082009-141351/en
dc.identifier.urihttp://hdl.handle.net/10919/32394en
dc.publisherVirginia Techen
dc.relation.haspartthesis_Harini_Jagadeesan.pdfen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectbiometricsen
dc.subjectbehavioralen
dc.subjecttestingen
dc.subjectmouseen
dc.subjectverificationen
dc.subjectkeyboarden
dc.subjectsecurityen
dc.subjectSpec#en
dc.subjectuser re-authenticationen
dc.titleDesign and Verification of Privacy and User Re-authentication Systemsen
dc.typeThesisen
thesis.degree.disciplineElectrical and Computer Engineeringen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.levelmastersen
thesis.degree.nameMaster of Scienceen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
thesis_Harini_Jagadeesan.pdf
Size:
16.03 MB
Format:
Adobe Portable Document Format

Collections