Abstract
Privacy and security today are extremely important as we enter the digital age. Authenticating users via passwords has proven to be secure, but flaws still exist. Due to the vast availability and flexibility of password authentication, it is now the most accepted form of user authentication. Intrusion systems, using various techniques, can find ways to break into passwords. Alternate solutions have been proposed, varying from expensive hardware-based authentication to two-phase authentication protocols. We offer an alternative system to authenticate users by extracting social user data available on Facebook and other social media, then generating questions using the collected data and user personality insights. Our mobile application and website are developed using Express Framework, NodeJS, and MongoDB.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
OGorman, Lawrence, Amit Bagga, and Jon Bentley. 2004. Financial cryptography. In Call center customer verification by query-directed passwords. Springer: Berlin. https://doi.org/10.1007/978-3-540-27809-2_6
Furnell, S.M., I. Papadopoulos, and Paul Dowland. 2004. A long-term trial of alternative user authentication technologies. Information Management and Computer Security 12 (2): 178–190. https://doi.org/10.1108/09685220410530816.
Rabkin, A. 2008. Personal knowledge questions for fallback authentication: Security questions in the era of Facebook. In SOUPS 2008 - Proceedings of the 4th symposium on usable privacy and security, 13–23.
Brown, Alex, and Myriam Abramson. 2015. Twitter fingerprints as active authenticators. In 2015 IEEE international conference on data mining workshop (ICDMW), 58-63, Atlantic City, NJ.
Nosseir, Ann, Richard Connor, and Karen Renaud. 2006. Question-based group authentication. In Proceedings of the 18th australia conference on computer-human interaction: design: activities, artefacts and environments. ACM.
Bachmann, Michael. 2014. Passwords are dead: alternative authentication methods. In 2014 IEEE Joint intelli-gence and security informatics conference (JISIC), IEEE.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Siddavatam, I., Khatri, D., Ashar, P., Parekh, V., Sharma, T. (2019). Authentication Using Dynamic Question Generation. In: Krishna, A., Srikantaiah, K., Naveena, C. (eds) Integrated Intelligent Computing, Communication and Security. Studies in Computational Intelligence, vol 771. Springer, Singapore. https://doi.org/10.1007/978-981-10-8797-4_31
Download citation
DOI: https://doi.org/10.1007/978-981-10-8797-4_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8796-7
Online ISBN: 978-981-10-8797-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)