Skip to main content

Necessity of Fourth Factor Authentication with Multiple Variations as Enhanced User Authentication Technique

  • Conference paper
  • First Online:
Proceedings of the Third International Conference on Computational Intelligence and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1090))

  • 762 Accesses

Abstract

Authentication plays a vital role in granting access to a user by any computing system. There are several existing authentication techniques used for different scenarios which include one-factor, two-factor, and three-factor authentication, where the user submits required credentials and gains access to the system. When a legitimate user is unable to provide his credentials at any point of time, the user becomes unauthenticated. At this juncture, we have proposed a fourth factor for authentication where a legitimate user can seek assistance from any of his close associates like a spouse, friend, and colleague and can gain access to the system for a single time. In this paper, we consider multiple variations of fourth-factor authentication and compare them within the framework and explore the mechanism by applying various metrics such as key size, the ease of use, time and space complexity of the algorithms, and security considerations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guo, Cheng, and Chin-Chen Chang. 2014. An Authenticated Group Key Distribution Protocol Based on the Generalized Chinese Remainder Theorem. International Journal of Communication System 27 (1): 126–134.

    Google Scholar 

  2. Sobotka, Jiri, and Radek Dolze. 2010. Multifactor Authentication Systems, Elektro Revue, 1–7.

    Google Scholar 

  3. Sharmila, K., V. Janaki, and K. Shilpa. 2014. An Alternative Authentication Methodology in Case of BiometricAuthentication Failure: AAP Protocol. International Journal of Engineering Research & Technology, 3 (1): 3487–3491.

    Google Scholar 

  4. Aloul, Fadi, Syed Zahidi, and Wassim El-Haj. 2009. Two Factor Authentication Using Mobile Phones. In IEEE/ACS International Conference on Computer Systems and Applications, 641–644.

    Google Scholar 

  5. Cormen, Thomas H., Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. 2001. Introduction to Algorithms, 2nd ed. MIT Press and McGraw-Hill.

    Google Scholar 

  6. Schechter, S., S. Egelman, and R.W. Reeder. 2009. It’s Not What You Know, But Who You Know: A Social Approach to Last-Resort Authentication. Human Factors in Computing Systems.

    Google Scholar 

  7. Sharmila, K., V. Janaki, and A. Nagaraju. 2013. Enhanced User Authentication Techniques using the Fourth Factor, Some Body the User Knows. In Proceeding of International Conference on Advances in Computer Science, AETACS, 255–262. Elsevier.

    Google Scholar 

  8. Ghosh, I., M.K. Sanyal, and R.K. Jana, 2017. Fractal Inspection and Machine Learning-Based Predictive Modelling Framework for Financial Markets. Arabian Journal for Science and Engineering.

    Google Scholar 

  9. Stallings, William. 2002. Network Security Essentials. Prentice Hall, 2nd ed.

    Google Scholar 

  10. Navya Sri M,M., Ramakrishna Murty, et al. 2017. Robust Features for Emotion Recognition from Speech by using Gaussian Mixture Model Classification. In International Conference and Published Proceeding in SIST Series, vol. 2, 437–444. Springer.

    Google Scholar 

  11. Blakley, G.R. 1979. Safeguarding Cryptographic Keys. National Computer Conference 4: 313–317.

    Google Scholar 

  12. Sharmila, K., V. Janaki, and A. Nagaraju 2017. A Survey on User Authentication Techniques. Oriental Journal of Computer Science & Technology, 10 (2): 513–519.

    Google Scholar 

  13. Iftene, Sorin. 2001. General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting. Electronic Notes in Theoretical Computer Science 186: 67–84.

    Google Scholar 

  14. Huang, Xinyi, Yang Ashley Chonka, Jianying Zhou, and Robert H. Deng. 2011. A Generic Framework for Three-Factor Authentication Preserving Security and Privacy in Distributed Systems. IEEE Transactions on Parallel and Distributed Systems, 22: 1390–1397.

    Google Scholar 

  15. Sharmila, K., V. Janaki, and A. Nagaraju A. 2017. Novel Approach for Emergency Backup Authentication Using Fourth Factor In: Innovations in Computer Science and Engineering, ed. H. Saini, R. Sayal, and S. Rawat, 313–323. Singapore: Springer.

    Google Scholar 

  16. Mignotte M. 1982. How to share a secret. In Beth T, Lecture Notes in Computer Science, 371–75. Springer-Verlag.

    Google Scholar 

  17. Shamir, Adi. 1979. How to Share a Secret. Communications of the ACM 22 (11): 612–613.

    Article  MathSciNet  Google Scholar 

  18. Brainard, John, Ari Juels, Ronald L. Rivest, Michael Szydlo, and Moti Yung. 2006. Fourth Factor Authentication: Somebody You Know. In ACM Conference on Computer and Communications Security, 168–178.

    Google Scholar 

  19. Asmuth, C.A., and J. Bloom. 1983. A Modular Approach to Key Safeguarding. IEEE Transactions on Information Theory 29 (2): 208–210.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Sharmila .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharmila, K., Janaki, V. (2020). Necessity of Fourth Factor Authentication with Multiple Variations as Enhanced User Authentication Technique. In: Raju, K., Govardhan, A., Rani, B., Sridevi, R., Murty, M. (eds) Proceedings of the Third International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 1090. Springer, Singapore. https://doi.org/10.1007/978-981-15-1480-7_41

Download citation

Publish with us

Policies and ethics