Keystroke with Data Leakage Detection for Secure Email Authentication

Abstract

The user authentication is the important factor which allows the user to use a particular software. The user authentication is also performed in various kinds of social media such as Gmail, Facebook, etc. The traditional password system is used for user authentication. But this technique has a lot of demerits in it. Some hackers also cracks the password and perform some unwanted actions in the user authentication. In order to remove the difficulties in this traditional password technique and to provide additional security in user authentication, the keystroke with data leakage detection for secure email authentication is designed. This system uses Keystroke Dynamics. This system consists of five different types of modules such as Email Framework Construction, User Enrolment, Keystroke Authentication, Data Sharing and Data Leakage Detection. This system gets the details of the user such as name and email. Then it allows to enter the password. This password is stored along with the keystroke dynamics data such as the typing speed of the password and the threshold value. Both the Keystroke dynamics data and the original password are stored in the database. When the user wants to log into the system, the user has to give the password according to the keystroke dynamics data. Then only, the user can log into the system. Hence this system can also be used in Cyber security and provide security and privacy for the user data. Mrs. V. Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi "Keystroke with Data Leakage Detection for Secure Email Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39969.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/39969/keystroke-with-data-leakage-detection-for-secure-email-authentication/mrs-v-hemalatha

Authors and Affiliations

Mrs. V. Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi

Keywords

Related Articles

A Systematic Review of Homoeopathic Drugs in the Treatment of Haemorrhoids

Due to modern civilized life style, eating habits and ignorance towards own health, many people facing many health problems. One of these health problem that the physician face in their day to day practice is haemorrhoid...

Rights Against Exploitation in the Context of Women and Children

If today we ponder about the word œprotection, women and children comes into picture immediately. Though women and children are believed to be the most delicate and pampered ones their rights are being encroached every...

A Study of Customer Purchasing Behaviour of Automobiles in Kukatpally, Hyderabad

In this competitive world automobiles have become an important part of daily transportation and the competition between different automobile industries lead to the high level innovations in automobiles in order to reach...

Risk Analysis in Construction Project

The chance is a measurable phase of uncertainty, for which we are capable to estimate the prevalence likelihood and the measurement of damage. The danger is assumed as a deviation from the preferred level. It can be nice...

A Study on Philosophy and Educational Thoughts of Sri Aurobindo Ghosh

The education field always needs someone to enrich the field of education for learning in a better manner. Several Indian educationists contributed in it. Shri Aurobindo also contributed a lot for bringing changes so tha...

Download PDF file
  • EP ID EP695294
  • DOI -
  • Views 89
  • Downloads 0

How To Cite

Mrs. V. Hemalatha, V. Boominathan, K. Harithas, P. Raj Kumar (2021). Keystroke with Data Leakage Detection for Secure Email Authentication. International Journal of Trend in Scientific Research and Development, 5(3), -. https://europub.co.uk/articles/-A-695294