The Current Use of Authentication Technologies: An Investigative Review
Document Type
Conference Proceeding
Publisher
IEEE
Faculty
Faculty of Health, Engineering and Science
School
School of Computer and Security Science
RAS ID
19890
Abstract
Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. Further to this, they are still mostly functioning at the point of entry and those performing sort of re-authentication executing it in an intrusive manner. This paper reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art understanding addressing the open problems to be tackled and available solutions to be adopted. Furthermore, it investigates whether these authentication technologies have the capability to fill the gap between high security and user satisfaction. Ultimately, it concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilized in a universal level, thus operating in a transparent, continuous and user-friendly manner.
DOI
10.1109/CLOUDCOMP.2015.7149658
Access Rights
subscription content
Comments
Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel, I., & Reich, C. (2015, April). The current use of authentication technologies: An investigative review. In Cloud Computing (ICCC), 2015 International Conference on (pp. 1-8). IEEE. Available here