Keystroke with Data Leakage Detection for Secure Email Authentication

Abstract

The user authentication is the important factor which allows the user to use a particular software. The user authentication is also performed in various kinds of social media such as Gmail, Facebook, etc. The traditional password system is used for user authentication. But this technique has a lot of demerits in it. Some hackers also cracks the password and perform some unwanted actions in the user authentication. In order to remove the difficulties in this traditional password technique and to provide additional security in user authentication, the keystroke with data leakage detection for secure email authentication is designed. This system uses Keystroke Dynamics. This system consists of five different types of modules such as Email Framework Construction, User Enrolment, Keystroke Authentication, Data Sharing and Data Leakage Detection. This system gets the details of the user such as name and email. Then it allows to enter the password. This password is stored along with the keystroke dynamics data such as the typing speed of the password and the threshold value. Both the Keystroke dynamics data and the original password are stored in the database. When the user wants to log into the system, the user has to give the password according to the keystroke dynamics data. Then only, the user can log into the system. Hence this system can also be used in Cyber security and provide security and privacy for the user data. Mrs. V. Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi "Keystroke with Data Leakage Detection for Secure Email Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39969.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/39969/keystroke-with-data-leakage-detection-for-secure-email-authentication/mrs-v-hemalatha

Authors and Affiliations

Mrs. V. Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi

Keywords

Related Articles

Test Anxiety and Academic Achievement in Thiruvannamalai District

The present study planned to probe the effects of test anxiety on academic achievement of high school pupils. The respondents encompassed of 300 school pupils 158 boys and 142 girls studied in IX standard were selected b...

IoT Based Water Quality Monitoring System for Smart Cities

Since from the last centuries, water has been affected due to many parameters and actions done by human beings. Due to these actions drinking water becomes dangerous and harmful with increase in living population and als...

A Case Analysis on Involvement of Big Data during Natural Disaster and Pandemics and its Uses in the Health Care Sector

Big data is an upcoming technology and requires utmost care for an efficient and smooth implementation of the technology. In case of healthcare the most challenging part of big data is the privacy, data security, handlin...

Performance Analysis of MIMO System on Different Modulation Scheme over Rician Channel

The wireless communications is one of the most active areas of technology development of our time. Recently, orthogonal frequency division multiplexing has been regarded as one of the core technologies for various wirele...

Myths, Realities and Prejudices about Factors Associated with Loss to Follow Up, Relapse and Treatment Failure in Tuberculosis Patients A Qualitative Study

Background There are numerous public health and clinical consequences of incomplete TB treatment. The patients develop resistance to first line ATT drugs. Treatment with second line drugs are less successful and more tox...

Download PDF file
  • EP ID EP695294
  • DOI -
  • Views 77
  • Downloads 0

How To Cite

Mrs. V. Hemalatha, V. Boominathan, K. Harithas, P. Raj Kumar (2021). Keystroke with Data Leakage Detection for Secure Email Authentication. International Journal of Trend in Scientific Research and Development, 5(3), -. https://europub.co.uk/articles/-A-695294