International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 3, March-April 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD39969 | Volume – 5 | Issue – 3 | March-April 2021 Page 797
Keystroke with Data Leakage Detection for
Secure Email Authentication
Mrs. V. Hemalatha1, V. Boominathan2, K. Harithas2, P. Raj Kumar2, S. Vijaya Bharathi2
1HOD,
1,2Department of CSE, N.S.N. College of Engineering and Technology, Karur, Tamil Nadu, India
ABSTRACT
The user authentication is the important factor which allows the user to use a
particular software. Theuser authenticationisalsoperformedinvariouskinds
of social media such as Gmail, Facebook, etc. The traditional passwordsystem
is used for user authentication. But this technique has a lot of demerits in it.
Some hackers also cracks the password and perform some unwanted actions
in the user authentication. In order to removethedifficultiesinthistraditional
password technique and to provide additional securityin userauthentication,
the keystroke with data leakage detection for secure email authentication is
designed. This system uses Keystroke Dynamics. This system consists of five
different types of modules such as Email Framework Construction, User
Enrolment, Keystroke Authentication, Data Sharing and Data Leakage
Detection. This system gets the details of the user such as name and email.
Then it allows to enter the password. This password is stored along with the
keystroke dynamics data such as the typing speed of the password and the
threshold value. Both the Keystroke dynamics data and the original password
are stored in the database. When the user wants to log into the system, the
user has to give the password according to the keystroke dynamicsdata.Then
only, the user can log into the system. Hence this system can also be used in
Cyber security and provide security and privacy for the user data.
KEYWORDS: Responsive, Mobility, Keystroke Dynamics, security
How to cite this paper: Mrs.V.Hemalatha
| V. Boominathan | K. Harithas | P. Raj
Kumar | S. Vijaya Bharathi "Keystroke
with Data Leakage Detection for Secure
Email Authentication" Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-5 | Issue-3,
April 2021, pp.797-
799, URL:
www.ijtsrd.com/papers/ijtsrd39969.pdf
Copyright © 2021 by author (s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
1. INTRODUCTION
Authentication is one of the most important process. One of
the oldest technique in protecting the user data is to use
passwords. But nowadays,passwordsare easiertocrack and
there is no protection for user’s data. Hence, the Keystroke
Dynamics feature is used to enhance the security features
and the user authentication of a system.
1.1. PROBLEM STATEMENT
The major problem in most of the IT companies are Data
leakage and cracking of passwords. Most of the Hackers use
password cracking softwares to crack the user’s password
and perform some unwanted actions such as stealing the
data, modifying the data and add some unwanted data with
the user’s data. This causes more number of problems in all
kinds of fields.
2. OBJECTIVES
The goals of our project is to create a system which uses
keystroke dynamics for user authentication.
The user interface of this system should be efficient,
user friendly and maintain privacy.
This system should provide security against all kinds of
piracy.
This system should notify the user when the data of the
user has been hacked.
3. EXISTING SYSTEM
Email is used by millions of people to communicate around
the world and it is important application for many
businesses. The backups of these can remain up to several
months on their server, even if it is deleted the mailbox.
Nowadays an email is becoming a mainstreambusinesstool.
An email is being used for communication at workplace and
from social media logins to bank accounts. Authentication of
the email process is only processed with the help of
username and password. User should create account and
register their username and password for further
verification process. Security of an email is themainconcern
for companies & it includes confidentiality that ensures
information will not expose to unauthorized entities. Email
messages passes through intermediate computers before
reaching their final destination and it is easy for attackers to
intercept and read messages. An email can be misused to
leave sensitive data open to compromise. So, it may be of
little surprise that attacks on emails are common. When an
authenticated user leaves a system logged in and with a
password attached to it that invites an attacker to steal the
sensitive data at their leisure. If employee used that
computer for personal use which means information is now
willingly available to the attacker.
4. PROPOSED SYSTEM
Email is one of the crucial aspects of web data
communication. The increasing use of email has led to a
lucrative business opportunity called spamming. To
overcome the problemsofauthenticationanddata leakagein
email sharing provide key stroke authentication technique
IJTSRD39969
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD39969 | Volume – 5 | Issue – 3 | March-April 2021 Page 798
and random key sharing methods. Keystroke authentication
can be classified as either static or continuous. The static
refers to keystroke analysis performedonlyatspecifictimes,
for example during the login process. When the latter is
applied, the analysis of the typing speed is performed
continuously during the whole session, thus providinga tool
to detect user substitution after the login. Proposed work
has implemented based on static key stroke method. In the
enrolment phase, for each user, a thresholdbasedkeystroke
values are acquired. Leakage detectionisimplementedusing
key sharing through SMS. When the message was shared
between sender and receiver, secret key will be generating
and distributing to the authority. When a receiver wants to
view the shared message, they will beauthenticateusingkey
value. Otherwise unauthorized access notification is shared
to the authority.
4.1. ARCHITECTURE
Fig.1 System Architecture
5. FIELDS OF THIS SYSTEM
Email Framework Construction
User Enrolment
Keystroke Authentication
Data Sharing
Data leakage detection
5.1. Email Framework Construction
A mail server is an application that receives incoming e-mail
from local users and remote senders and forwards outgoing
e-mail for delivery. A computer dedicated to running such
applications is also called a mail server. In this module
framework like a mail server was created. This framework
contains server and multiple users. Server can maintain all
user details. Users easily upload the files in inbox and also
share the data anywhere and anytime. This framework
enable for provide key stroke authentication and leakage
detection process.
5.2. User Enrolment
In this Email application,Userhastoregistertheappropriate
details in the Email server database for using the
authentication process. These details include username,
address, email id, contact number, primary password,
confirm password and keystroke value.Thekeystrokevalue
analyzed during password typing. Keystroke duration
threshold and user details are stored in the server database.
5.3. Keystroke Authentication
Anonymous access is the most common website access
control method, which allows anyone to visit the public
areas of a website while preventingunauthorizedusersfrom
gaining access to a critical features and private information
of web servers. The user verification phaseanalyzesthe mail
id, password and keystroke value of the server. During
password verification, key stroke time for password will be
calculated and matched with database.Usershouldenterthe
password with the specified time, otherwise they will not
allow to access application.
5.4. Data Sharing
User can share the message to another user in secure email
environment. Once completion of authentication process
they will be allow to compose the mail. Then add the
recipient detail to communicate. Receiver also creates
account with key stroke authentication method. Authorized
users are allowed to access this application.
5.5. Data Leakage Detection
The Mail is being sent to authorized user and unauthorized
user. As the unauthorized user receives the mail, the system
detects that the mail has been send to the unauthorizeduser
using key verification process; Receiver want to verify their
secret key before accessing mail content. Here, on the user
side, if the unauthorized user accesses that mail, the mail
does not display the contents of the mail.
6. CONCLUSION
To deal with the problem of Data leakage, this system
implements a variety of data distribution strategies that can
improve the distributor's chances of identifying a leaker.
Also it includes implementation of the concept of key stroke
authentication for user authentication. In proposed email
framework, users register using their detailswithkeystroke
values. During login process, user can also be verified using
their password with key stroke values. This will enhancethe
process of authentication in email and also provides OTP
generation, to predict the authorization of user duringemail
content access.
6.1. Future Enhancement
Future work includes the investigation of agent guiltmodels
that capture leakage scenarios. Watermarking that uses
various algorithms through encryption to offer security can
be designed along with probability-based model which
provides both the security as well as detection technique to
identify guilty.
REFERENCES
[1] Alotaibi, Saud, Abdulrahman Alruban, StevenFurnell,
and Nathan L. Clarke. "A Novel Behaviour Profiling
Approach to Continuous Authentication for Mobile
Applications." In ICISSP, pp. 246-251.
2019.
[2] Mhenni, Abir, Estelle Cherrier, Christophe
Rosenberger, and Najoua Essoukri Ben Amara.
"Double serial adaptation mechanism for keystroke
dynamics authentication basedona singlepassword."
Computers & Security 83 (2019): 151-166.
[3] Foresi, Andrew, and Reza Samavi. "User
authentication using keystroke dynamics via crowd
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD39969 | Volume – 5 | Issue – 3 | March-April 2021 Page 799
sourcing." In 2019 17th International Conference on
Privacy, Security and Trust (PST), pp. 1-3.IEEE,2019.
[4] Salem, Asma, and Mohammad S. Obaidat. "A novel
security scheme for behavioral authentication
systems based on keystroke dynamics." Security and
Privacy 2, no. 2 (2019): e64.
[5] Ferrari, Carlo, Daniele Marini, and Michele Moro. "An
adaptive typing biometric system with varying users
model." In 2018 32nd International Conference on
Advanced Information Networking and Applications
Workshops (WAINA), pp. 564-568. IEEE, 2018.
[6] Shen, Sung-Shiou, Tsai-Hua Kang, Shen-Ho Lin, and
Wei Chien. "Random graphic user password
authentication scheme in mobile devices." In 2017
International conference on applied system
innovation (ICASI), pp. 1251-1254. IEEE, 2017.
[7] Alsuhibany, Suliman A., Muna Almushyti, Noorah
Alghasham, and Fatimah Alkhudier. "Analysis offree-
text keystroke dynamics for Arabic language using
Euclidean distance." In 2016 12th International
ConferenceonInnovationsinInformationTechnology
(IIT), pp. 1-6. IEEE, 2016.
[8] Ahmed, Ahmed A., and Issa Traore. "Biometric
recognition based on free-text keystroke dynamics."
IEEE transactions on cybernetics 44, no. 4 (2013):
458-472.
[9] Huang, Jiaju, Daqing Hou,andStephanieSchuckers."A
practical evaluation of free-text keystrokedynamics."
In 2017 IEEE International Conference on Identity,
Security and Behavior Analysis (ISBA), pp.1-8. IEEE,
2017.
[10] Senathipathi, K., and Krishnan Batri. "An analysis of
particle swarm optimization and genetic algorithm
with respect to keystroke dynamics." In 2014
international conference on green computing
communication and electrical engineering(ICGCCEE),
pp. 1-11. IEEE, 2014.

More Related Content

PDF
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
PDF
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
PDF
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
PDF
IRJET- Security from Threats of Computer System
PDF
Secure instant messanger service
PDF
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
PDF
A Survey on Privacy in Social Networking Websites
PPT
Instant messaging tech scet
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
IRJET- Security from Threats of Computer System
Secure instant messanger service
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
A Survey on Privacy in Social Networking Websites
Instant messaging tech scet

What's hot (20)

PDF
I1804015458
PDF
Online Signature Authentication by Using Mouse Behavior
PDF
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
PDF
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
PDF
An Anti-Phishing Framework Based on Visual Cryptography
PDF
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
PPTX
Multitenency - Solving Security Issue
PDF
IRJET - Secure Banking Application with Image and GPS Location
PDF
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
PDF
Continuous User Identity Verification through Secure Login Session
PDF
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
PDF
IRJET- Multi sharing Data using OTP
PDF
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
PPT
Cryptography introduction
PDF
Ld3420072014
PDF
Log into android mobile to fetch the device oriented information using remote...
PDF
Log into android mobile to fetch the device oriented information using remote...
PDF
Security Issues and Challenges in Internet of Things – A Review
PDF
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
PDF
Usb based secure e mail
I1804015458
Online Signature Authentication by Using Mouse Behavior
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
An Anti-Phishing Framework Based on Visual Cryptography
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
Multitenency - Solving Security Issue
IRJET - Secure Banking Application with Image and GPS Location
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
Continuous User Identity Verification through Secure Login Session
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
IRJET- Multi sharing Data using OTP
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
Cryptography introduction
Ld3420072014
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
Security Issues and Challenges in Internet of Things – A Review
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
Usb based secure e mail
Ad

Similar to Keystroke with Data Leakage Detection for Secure Email Authentication (20)

PDF
J0704055058
PDF
Electronic Mail Security (University of Jeddah, Saudi Arabia)
PPTX
Email security
PPTX
cryptography for home users
PDF
Psdot 13 robust data leakage and email filtering system
PDF
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
DOCX
YosefGamble_Writing_Sample_Email_Security
PPTX
Information and network security 47 authentication applications
PDF
Email security
PDF
Advance Cipher Technique to Secure Email Contents
PPTX
PDF
USB BASED SECURE E-MAIL
PDF
Usb based secure e mail
PDF
A System for Detection and Prevention of Data Leak
PDF
IRJET- Keystroke Dynamics for user Authentication
PDF
Final report
PDF
Automated E-Pin Generator in Banking Sector
PDF
A Better Method of Authentication
PDF
(2006) Keystroke Dynamics Verification Using a Spontaneously Generated Password
PPTX
Email Security Solutions | Seclore
J0704055058
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Email security
cryptography for home users
Psdot 13 robust data leakage and email filtering system
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
YosefGamble_Writing_Sample_Email_Security
Information and network security 47 authentication applications
Email security
Advance Cipher Technique to Secure Email Contents
USB BASED SECURE E-MAIL
Usb based secure e mail
A System for Detection and Prevention of Data Leak
IRJET- Keystroke Dynamics for user Authentication
Final report
Automated E-Pin Generator in Banking Sector
A Better Method of Authentication
(2006) Keystroke Dynamics Verification Using a Spontaneously Generated Password
Email Security Solutions | Seclore
Ad

More from YogeshIJTSRD (20)

PDF
Cosmetic Science An Overview
PDF
Standardization and Formulations of Calotropis Procera
PDF
Review of the Diagnosis and Treatment of Paralysis
PDF
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
PDF
Criminology Educators Triumphs and Struggles
PDF
A Review Herbal Drugs Used in Skin Disorder
PDF
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
PDF
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
PDF
Data Security by AES Advanced Encryption Standard
PDF
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
PDF
Heat Sink for Underground Pipe Line
PDF
Newly Proposed Multi Channel Fiber Optic Cable Core
PDF
Security Sector Reform toward Professionalism of Military and Police
PDF
Stress An Undetachable Condition of Life
PDF
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
PDF
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
PDF
Novel Drug Delivery System An Overview
PDF
Security Issues Related to Biometrics
PDF
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
PDF
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
Cosmetic Science An Overview
Standardization and Formulations of Calotropis Procera
Review of the Diagnosis and Treatment of Paralysis
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Criminology Educators Triumphs and Struggles
A Review Herbal Drugs Used in Skin Disorder
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
Data Security by AES Advanced Encryption Standard
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
Heat Sink for Underground Pipe Line
Newly Proposed Multi Channel Fiber Optic Cable Core
Security Sector Reform toward Professionalism of Military and Police
Stress An Undetachable Condition of Life
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
Novel Drug Delivery System An Overview
Security Issues Related to Biometrics
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content

Recently uploaded (20)

PDF
Health aspects of bilberry: A review on its general benefits
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
Thinking Routines and Learning Engagements.pptx
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PPT
Acidosis in Dairy Herds: Causes, Signs, Management, Prevention and Treatment
PPTX
Neurology of Systemic disease all systems
PDF
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPTX
Reproductive system-Human anatomy and physiology
PPTX
Neurological complocations of systemic disease
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PPT
hemostasis and its significance, physiology
PPTX
Diploma pharmaceutics notes..helps diploma students
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PPT
hsl powerpoint resource goyloveh feb 07.ppt
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
Laparoscopic Dissection Techniques at WLH
PDF
African Communication Research: A review
Health aspects of bilberry: A review on its general benefits
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Thinking Routines and Learning Engagements.pptx
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Acidosis in Dairy Herds: Causes, Signs, Management, Prevention and Treatment
Neurology of Systemic disease all systems
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
UNIT_2-__LIPIDS[1].pptx.................
Reproductive system-Human anatomy and physiology
Neurological complocations of systemic disease
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
2025 High Blood Pressure Guideline Slide Set.pptx
hemostasis and its significance, physiology
Diploma pharmaceutics notes..helps diploma students
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
hsl powerpoint resource goyloveh feb 07.ppt
Disorder of Endocrine system (1).pdfyyhyyyy
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Laparoscopic Dissection Techniques at WLH
African Communication Research: A review

Keystroke with Data Leakage Detection for Secure Email Authentication

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 3, March-April 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD39969 | Volume – 5 | Issue – 3 | March-April 2021 Page 797 Keystroke with Data Leakage Detection for Secure Email Authentication Mrs. V. Hemalatha1, V. Boominathan2, K. Harithas2, P. Raj Kumar2, S. Vijaya Bharathi2 1HOD, 1,2Department of CSE, N.S.N. College of Engineering and Technology, Karur, Tamil Nadu, India ABSTRACT The user authentication is the important factor which allows the user to use a particular software. Theuser authenticationisalsoperformedinvariouskinds of social media such as Gmail, Facebook, etc. The traditional passwordsystem is used for user authentication. But this technique has a lot of demerits in it. Some hackers also cracks the password and perform some unwanted actions in the user authentication. In order to removethedifficultiesinthistraditional password technique and to provide additional securityin userauthentication, the keystroke with data leakage detection for secure email authentication is designed. This system uses Keystroke Dynamics. This system consists of five different types of modules such as Email Framework Construction, User Enrolment, Keystroke Authentication, Data Sharing and Data Leakage Detection. This system gets the details of the user such as name and email. Then it allows to enter the password. This password is stored along with the keystroke dynamics data such as the typing speed of the password and the threshold value. Both the Keystroke dynamics data and the original password are stored in the database. When the user wants to log into the system, the user has to give the password according to the keystroke dynamicsdata.Then only, the user can log into the system. Hence this system can also be used in Cyber security and provide security and privacy for the user data. KEYWORDS: Responsive, Mobility, Keystroke Dynamics, security How to cite this paper: Mrs.V.Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi "Keystroke with Data Leakage Detection for Secure Email Authentication" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3, April 2021, pp.797- 799, URL: www.ijtsrd.com/papers/ijtsrd39969.pdf Copyright © 2021 by author (s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) 1. INTRODUCTION Authentication is one of the most important process. One of the oldest technique in protecting the user data is to use passwords. But nowadays,passwordsare easiertocrack and there is no protection for user’s data. Hence, the Keystroke Dynamics feature is used to enhance the security features and the user authentication of a system. 1.1. PROBLEM STATEMENT The major problem in most of the IT companies are Data leakage and cracking of passwords. Most of the Hackers use password cracking softwares to crack the user’s password and perform some unwanted actions such as stealing the data, modifying the data and add some unwanted data with the user’s data. This causes more number of problems in all kinds of fields. 2. OBJECTIVES The goals of our project is to create a system which uses keystroke dynamics for user authentication. The user interface of this system should be efficient, user friendly and maintain privacy. This system should provide security against all kinds of piracy. This system should notify the user when the data of the user has been hacked. 3. EXISTING SYSTEM Email is used by millions of people to communicate around the world and it is important application for many businesses. The backups of these can remain up to several months on their server, even if it is deleted the mailbox. Nowadays an email is becoming a mainstreambusinesstool. An email is being used for communication at workplace and from social media logins to bank accounts. Authentication of the email process is only processed with the help of username and password. User should create account and register their username and password for further verification process. Security of an email is themainconcern for companies & it includes confidentiality that ensures information will not expose to unauthorized entities. Email messages passes through intermediate computers before reaching their final destination and it is easy for attackers to intercept and read messages. An email can be misused to leave sensitive data open to compromise. So, it may be of little surprise that attacks on emails are common. When an authenticated user leaves a system logged in and with a password attached to it that invites an attacker to steal the sensitive data at their leisure. If employee used that computer for personal use which means information is now willingly available to the attacker. 4. PROPOSED SYSTEM Email is one of the crucial aspects of web data communication. The increasing use of email has led to a lucrative business opportunity called spamming. To overcome the problemsofauthenticationanddata leakagein email sharing provide key stroke authentication technique IJTSRD39969
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD39969 | Volume – 5 | Issue – 3 | March-April 2021 Page 798 and random key sharing methods. Keystroke authentication can be classified as either static or continuous. The static refers to keystroke analysis performedonlyatspecifictimes, for example during the login process. When the latter is applied, the analysis of the typing speed is performed continuously during the whole session, thus providinga tool to detect user substitution after the login. Proposed work has implemented based on static key stroke method. In the enrolment phase, for each user, a thresholdbasedkeystroke values are acquired. Leakage detectionisimplementedusing key sharing through SMS. When the message was shared between sender and receiver, secret key will be generating and distributing to the authority. When a receiver wants to view the shared message, they will beauthenticateusingkey value. Otherwise unauthorized access notification is shared to the authority. 4.1. ARCHITECTURE Fig.1 System Architecture 5. FIELDS OF THIS SYSTEM Email Framework Construction User Enrolment Keystroke Authentication Data Sharing Data leakage detection 5.1. Email Framework Construction A mail server is an application that receives incoming e-mail from local users and remote senders and forwards outgoing e-mail for delivery. A computer dedicated to running such applications is also called a mail server. In this module framework like a mail server was created. This framework contains server and multiple users. Server can maintain all user details. Users easily upload the files in inbox and also share the data anywhere and anytime. This framework enable for provide key stroke authentication and leakage detection process. 5.2. User Enrolment In this Email application,Userhastoregistertheappropriate details in the Email server database for using the authentication process. These details include username, address, email id, contact number, primary password, confirm password and keystroke value.Thekeystrokevalue analyzed during password typing. Keystroke duration threshold and user details are stored in the server database. 5.3. Keystroke Authentication Anonymous access is the most common website access control method, which allows anyone to visit the public areas of a website while preventingunauthorizedusersfrom gaining access to a critical features and private information of web servers. The user verification phaseanalyzesthe mail id, password and keystroke value of the server. During password verification, key stroke time for password will be calculated and matched with database.Usershouldenterthe password with the specified time, otherwise they will not allow to access application. 5.4. Data Sharing User can share the message to another user in secure email environment. Once completion of authentication process they will be allow to compose the mail. Then add the recipient detail to communicate. Receiver also creates account with key stroke authentication method. Authorized users are allowed to access this application. 5.5. Data Leakage Detection The Mail is being sent to authorized user and unauthorized user. As the unauthorized user receives the mail, the system detects that the mail has been send to the unauthorizeduser using key verification process; Receiver want to verify their secret key before accessing mail content. Here, on the user side, if the unauthorized user accesses that mail, the mail does not display the contents of the mail. 6. CONCLUSION To deal with the problem of Data leakage, this system implements a variety of data distribution strategies that can improve the distributor's chances of identifying a leaker. Also it includes implementation of the concept of key stroke authentication for user authentication. In proposed email framework, users register using their detailswithkeystroke values. During login process, user can also be verified using their password with key stroke values. This will enhancethe process of authentication in email and also provides OTP generation, to predict the authorization of user duringemail content access. 6.1. Future Enhancement Future work includes the investigation of agent guiltmodels that capture leakage scenarios. Watermarking that uses various algorithms through encryption to offer security can be designed along with probability-based model which provides both the security as well as detection technique to identify guilty. REFERENCES [1] Alotaibi, Saud, Abdulrahman Alruban, StevenFurnell, and Nathan L. Clarke. "A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications." In ICISSP, pp. 246-251. 2019. [2] Mhenni, Abir, Estelle Cherrier, Christophe Rosenberger, and Najoua Essoukri Ben Amara. "Double serial adaptation mechanism for keystroke dynamics authentication basedona singlepassword." Computers & Security 83 (2019): 151-166. [3] Foresi, Andrew, and Reza Samavi. "User authentication using keystroke dynamics via crowd
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD39969 | Volume – 5 | Issue – 3 | March-April 2021 Page 799 sourcing." In 2019 17th International Conference on Privacy, Security and Trust (PST), pp. 1-3.IEEE,2019. [4] Salem, Asma, and Mohammad S. Obaidat. "A novel security scheme for behavioral authentication systems based on keystroke dynamics." Security and Privacy 2, no. 2 (2019): e64. [5] Ferrari, Carlo, Daniele Marini, and Michele Moro. "An adaptive typing biometric system with varying users model." In 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 564-568. IEEE, 2018. [6] Shen, Sung-Shiou, Tsai-Hua Kang, Shen-Ho Lin, and Wei Chien. "Random graphic user password authentication scheme in mobile devices." In 2017 International conference on applied system innovation (ICASI), pp. 1251-1254. IEEE, 2017. [7] Alsuhibany, Suliman A., Muna Almushyti, Noorah Alghasham, and Fatimah Alkhudier. "Analysis offree- text keystroke dynamics for Arabic language using Euclidean distance." In 2016 12th International ConferenceonInnovationsinInformationTechnology (IIT), pp. 1-6. IEEE, 2016. [8] Ahmed, Ahmed A., and Issa Traore. "Biometric recognition based on free-text keystroke dynamics." IEEE transactions on cybernetics 44, no. 4 (2013): 458-472. [9] Huang, Jiaju, Daqing Hou,andStephanieSchuckers."A practical evaluation of free-text keystrokedynamics." In 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), pp.1-8. IEEE, 2017. [10] Senathipathi, K., and Krishnan Batri. "An analysis of particle swarm optimization and genetic algorithm with respect to keystroke dynamics." In 2014 international conference on green computing communication and electrical engineering(ICGCCEE), pp. 1-11. IEEE, 2014.