Title

The Current Use of Authentication Technologies: An Investigative Review

Document Type

Conference Proceeding

Publisher

IEEE

Faculty

Health, Engineering and Science

School

School of Computer and Security Science

RAS ID

19890

Comments

This article was originally published as: Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel, I., & Reich, C. (2015, April). The current use of authentication technologies: An investigative review. In Cloud Computing (ICCC), 2015 International Conference on (pp. 1-8). IEEE. Original article available here

Abstract

Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. Further to this, they are still mostly functioning at the point of entry and those performing sort of re-authentication executing it in an intrusive manner. This paper reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art understanding addressing the open problems to be tackled and available solutions to be adopted. Furthermore, it investigates whether these authentication technologies have the capability to fill the gap between high security and user satisfaction. Ultimately, it concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilized in a universal level, thus operating in a transparent, continuous and user-friendly manner.

DOI

10.1109/CLOUDCOMP.2015.7149658

Access Rights

Not open access

Share

 
COinS