Keystroke with Data Leakage Detection for Secure Email Authentication

Abstract

The user authentication is the important factor which allows the user to use a particular software. The user authentication is also performed in various kinds of social media such as Gmail, Facebook, etc. The traditional password system is used for user authentication. But this technique has a lot of demerits in it. Some hackers also cracks the password and perform some unwanted actions in the user authentication. In order to remove the difficulties in this traditional password technique and to provide additional security in user authentication, the keystroke with data leakage detection for secure email authentication is designed. This system uses Keystroke Dynamics. This system consists of five different types of modules such as Email Framework Construction, User Enrolment, Keystroke Authentication, Data Sharing and Data Leakage Detection. This system gets the details of the user such as name and email. Then it allows to enter the password. This password is stored along with the keystroke dynamics data such as the typing speed of the password and the threshold value. Both the Keystroke dynamics data and the original password are stored in the database. When the user wants to log into the system, the user has to give the password according to the keystroke dynamics data. Then only, the user can log into the system. Hence this system can also be used in Cyber security and provide security and privacy for the user data. Mrs. V. Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi "Keystroke with Data Leakage Detection for Secure Email Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39969.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/39969/keystroke-with-data-leakage-detection-for-secure-email-authentication/mrs-v-hemalatha

Authors and Affiliations

Mrs. V. Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi

Keywords

Related Articles

A Study on Food Habits and Social Habits as Risk Factors among Patients Undergoing Percatenous Transluminal Coronary Angioplasty PTCA

AIM A study on food habits and social habits as risk factors among patients undergoing Percutaneous Transluminal Coronary Angioplasty PTCA OBJECTIVE To know the association of food habits and social habits as risk factor...

Data Mining based on Hashing Technique

Data Mining is an important aspect for any business. Most of the management level decisions are based on the process of Data Mining. One of such aspect is the association between different sale products i.e. what is the...

Students Related Factors Influencing Their Performance in Ordinary Level Biology at the Cameroon General Certificate of Education CGCE

Poor performance in O L Biology at the CGCE examination can be attributed to reasons from varied sources. However, this study sought to investigate how students related factors influence their performance in Ordinary Lev...

Remotely Scanning Organization’s Internal Network

This project mainly focuses on remotely scanning the organization’s internal network using precise, advanced and most efficient tools built installed on the Raspberry Pi. Keeping all the security aspects in scope, this t...

Abrasion of Current Weather of a City Using Variant Python Libraries and Weather Application Programming Interface API

Web allows a wide extent of realities and information source set up by people. However, it will comprise of a gigantic arrangement of divergent and debilitated coordinated information. In metropolitan urban areas of Indi...

Download PDF file
  • EP ID EP695294
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

Mrs. V. Hemalatha, V. Boominathan, K. Harithas, P. Raj Kumar (2021). Keystroke with Data Leakage Detection for Secure Email Authentication. International Journal of Trend in Scientific Research and Development, 5(3), -. https://europub.co.uk/articles/-A-695294