Abstract
Authentication plays a vital role in granting access to a user by any computing system. There are several existing authentication techniques used for different scenarios which include one-factor, two-factor, and three-factor authentication, where the user submits required credentials and gains access to the system. When a legitimate user is unable to provide his credentials at any point of time, the user becomes unauthenticated. At this juncture, we have proposed a fourth factor for authentication where a legitimate user can seek assistance from any of his close associates like a spouse, friend, and colleague and can gain access to the system for a single time. In this paper, we consider multiple variations of fourth-factor authentication and compare them within the framework and explore the mechanism by applying various metrics such as key size, the ease of use, time and space complexity of the algorithms, and security considerations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Guo, Cheng, and Chin-Chen Chang. 2014. An Authenticated Group Key Distribution Protocol Based on the Generalized Chinese Remainder Theorem. International Journal of Communication System 27 (1): 126–134.
Sobotka, Jiri, and Radek Dolze. 2010. Multifactor Authentication Systems, Elektro Revue, 1–7.
Sharmila, K., V. Janaki, and K. Shilpa. 2014. An Alternative Authentication Methodology in Case of BiometricAuthentication Failure: AAP Protocol. International Journal of Engineering Research & Technology, 3 (1): 3487–3491.
Aloul, Fadi, Syed Zahidi, and Wassim El-Haj. 2009. Two Factor Authentication Using Mobile Phones. In IEEE/ACS International Conference on Computer Systems and Applications, 641–644.
Cormen, Thomas H., Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. 2001. Introduction to Algorithms, 2nd ed. MIT Press and McGraw-Hill.
Schechter, S., S. Egelman, and R.W. Reeder. 2009. It’s Not What You Know, But Who You Know: A Social Approach to Last-Resort Authentication. Human Factors in Computing Systems.
Sharmila, K., V. Janaki, and A. Nagaraju. 2013. Enhanced User Authentication Techniques using the Fourth Factor, Some Body the User Knows. In Proceeding of International Conference on Advances in Computer Science, AETACS, 255–262. Elsevier.
Ghosh, I., M.K. Sanyal, and R.K. Jana, 2017. Fractal Inspection and Machine Learning-Based Predictive Modelling Framework for Financial Markets. Arabian Journal for Science and Engineering.
Stallings, William. 2002. Network Security Essentials. Prentice Hall, 2nd ed.
Navya Sri M,M., Ramakrishna Murty, et al. 2017. Robust Features for Emotion Recognition from Speech by using Gaussian Mixture Model Classification. In International Conference and Published Proceeding in SIST Series, vol. 2, 437–444. Springer.
Blakley, G.R. 1979. Safeguarding Cryptographic Keys. National Computer Conference 4: 313–317.
Sharmila, K., V. Janaki, and A. Nagaraju 2017. A Survey on User Authentication Techniques. Oriental Journal of Computer Science & Technology, 10 (2): 513–519.
Iftene, Sorin. 2001. General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting. Electronic Notes in Theoretical Computer Science 186: 67–84.
Huang, Xinyi, Yang Ashley Chonka, Jianying Zhou, and Robert H. Deng. 2011. A Generic Framework for Three-Factor Authentication Preserving Security and Privacy in Distributed Systems. IEEE Transactions on Parallel and Distributed Systems, 22: 1390–1397.
Sharmila, K., V. Janaki, and A. Nagaraju A. 2017. Novel Approach for Emergency Backup Authentication Using Fourth Factor In: Innovations in Computer Science and Engineering, ed. H. Saini, R. Sayal, and S. Rawat, 313–323. Singapore: Springer.
Mignotte M. 1982. How to share a secret. In Beth T, Lecture Notes in Computer Science, 371–75. Springer-Verlag.
Shamir, Adi. 1979. How to Share a Secret. Communications of the ACM 22 (11): 612–613.
Brainard, John, Ari Juels, Ronald L. Rivest, Michael Szydlo, and Moti Yung. 2006. Fourth Factor Authentication: Somebody You Know. In ACM Conference on Computer and Communications Security, 168–178.
Asmuth, C.A., and J. Bloom. 1983. A Modular Approach to Key Safeguarding. IEEE Transactions on Information Theory 29 (2): 208–210.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharmila, K., Janaki, V. (2020). Necessity of Fourth Factor Authentication with Multiple Variations as Enhanced User Authentication Technique. In: Raju, K., Govardhan, A., Rani, B., Sridevi, R., Murty, M. (eds) Proceedings of the Third International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 1090. Springer, Singapore. https://doi.org/10.1007/978-981-15-1480-7_41
Download citation
DOI: https://doi.org/10.1007/978-981-15-1480-7_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1479-1
Online ISBN: 978-981-15-1480-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)