A Robust User Authentication Technique in Online Examination
DOI:
https://doi.org/10.47839/ijc.20.4.2441Keywords:
online exams interface design, user preferences, online authentication, authentication methods, e-examAbstract
User authentication in the online environment is promoting a hugely challenging issue. This has contributed to the realization of a user authentication where the exams can be performed over the Internet at any time and from any place and by using any digital device. Consequently, further investigations are required to focus on improving user authentication methods to enhance online security mechanisms, especially in the field of e-exams. This research proposes a new user authentication technique based on the user interface (UI). The novel idea is created based on the design preferences of candidates who are taking the e-exams. Several design features are used to design a special user interface for e-exams, for example, the font attributes, back colour, number of questions per page, group categories for questions based on difficulties, and timer setting. The introduced technique can be used to support the user authentication process in the e-exams environment. Furthermore, the proposed technique provides the ability to login to the e-exam without the need to remember the login information, but to select what the student prefers according to his/her personal information. Based on the literature review, a primary evaluation claiming that the students have differences in their preferences and that each user has stable design preferences within different sessions is revealed. In regard to these facts, they become the resource and essence of this research. The security performance of the proposed method is evaluated. The results of the experiments show a false positive (FP) rate of 0.416% and a false negative (FN) rate of 0%.
References
A. Moini and A. M. Madni, “Leveraging biometrics for user authentication in online learning: A systems perspective,” IEEE Syst. J., vol. 3, no. 4, pp. 469–476, 2009. https://doi.org/10.1109/JSYST.2009.2038957.
B. Penteado and A. Marana, “A video-based biometric authentication for e-learning web applications,” Enterp. Inf. Syst., 2009. https://doi.org/10.1007/978-3-642-01347-8_64.
S. M. Al-Saleem and H. Ullah, “Security considerations and recommendations in computer-based testing,” Scientific World Journal, vol. 2014, p. 562787, 2014. https://doi.org/10.1155/2014/562787.
A. Ullah, H. Xiao, M. Lilley, and T. Barker, “Using challenge questions for student authentication in online examination,” Int. J. Infonomics, vol. 5, no. 3, pp. 631–639, 2012. https://doi.org/10.20533/iji.1742.4712.2012.0072.
S. Asha and C. Chellappan, “Authentication of e-learners using multimodal biometric technology,” Proceedings of the 2008 Int. Symp. Biometrics Secur. Technol., pp. 1–6, 2008. https://doi.org/10.1109/ISBAST.2008.4547640.
H. Saevanee, N. Clarke, S. Furnell, and V. Biscione, “Continuous user authentication using multi-modal biometrics,” vol. 53, issue C, pp. 234–246, 2015. https://doi.org/10.1016/j.cose.2015.06.001.
M. Zviran, “Identification and authentication : Technology and implementation issues,” Commun. Assoc. Inf. Syst., vol. 17, no. 1, pp. 2–30, 2006. https://doi.org/10.17705/1CAIS.01704.
T. Peltier and J. Peltier, Complete Guide to CISM Certification, Netw. Secur., 2007, 476 p.
N. A. Karim and Z. Shukur, “Using preferences as user identification in the online examination,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 6, no. 6, pp. 1026-1032, 2016. https://doi.org/10.18517/ijaseit.6.6.1412.
N. A. Karim, Z. Shukur, and A. E. M. AL-banna, “UIPA: User authentication method based on user interface preferences for account recovery process,” J. Inf. Secur. Appl., vol. 52, 102466, 2020. https://doi.org/10.1016/j.jisa.2020.102466.
O. Ogbanufe and D. J. Kim, “Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment,” Decis. Support Syst., vol. 106, pp. 1–14, 2018. https://doi.org/10.1016/j.dss.2017.11.003.
A. Alzubaidi and J. Kalita, “Authentication of smartphone users using behavioral biometrics,” IEEE Commun. Surv. Tutorials, vol. 18, no. 3, pp. 1998–2026, 2016. https://doi.org/10.1109/COMST.2016.2537748.
V. M. Patel, N. K. Ratha, and R. Chellappa, “Cancelable biometrics: A review,” IEEE Signal Process. Mag., vol. 32, no. 5, pp. 54–65, 2015. https://doi.org/10.1109/MSP.2015.2434151.
I. Velásquez, A. Caro, A. Caro, and A. Rodríguez, “Authentication Schemes and Methods: a Systematic Literature Review,” Information and Sowtware Technology, vol. 94, pp. 30-37, 2018. https://doi.org/10.1016/j.infsof.2017.09.012.
Z. Abdel Karim, Nader, Shukur, “Review of user authentication methods in online examination,” Asian J. Inf. Technol., vol. 14, no. 5, pp. 166–175, 2015.
K. S. Park and C. Hwan Lim, “A structured methodology for comparative evaluation of user interface designs using usability criteria and measures,” Int. J. Ind. Ergon., vol. 23, no. 5–6, pp. 379–389, 1999. https://doi.org/10.1016/S0169-8141(97)00059-0.
G. Calvary, J. Coutaz, D. Thevenin, Q. Limbourg, L. Bouillon, and J. Vanderdonckt, “A unifying reference framework for multi-target user interfaces,” Interact. Comput., vol. 15, pp. 289–308, 2003. https://doi.org/10.1016/S0953-5438(03)00010-9.
P.-L. P. Rau, Y.-Y. Choong, and G. Salvendy, “A cross cultural study on knowledge representation and structure in human computer interfaces,” Int. J. Ind. Ergon., vol. 34, no. 2, pp. 117–129, 2004. https://doi.org/10.1016/j.ergon.2004.03.006.
D. Lam and D. Swayne, “Issues of EIS software design: Some lessons learned in the past decade,” Environ. Model. Softw., vol. 16, no. 5, pp. 419–425, 2001. https://doi.org/10.1016/S1364-8152(01)00011-1.
W. O. Galitz, The Essential Guide to User Interface Design: An Introduction to GUI Design Principles and Techniques, Wiley, 2007.
G. McDaniel, IBM Dictionary of Computing, 1994, 758 p.
A. R. Puerta, “Supporting User-Centered Design of Adaptive User Interfaces Via Interface Models,” Time Intell. User Interfaces Decis. Support, 1998.
P. A. Chalmers, “The role of cognitive theory in human-computer interface,” Comput. Human Behav., vol. 19, no. 5, pp. 593–607, 2003. https://doi.org/10.1016/S0747-5632(02)00086-9.
A. Agah and K. Tanie, “Intelligent graphical user interface design utilizing multiple fuzzy agents,” Interact. Comput., vol. 12, no. 5, pp. 529–542, 2000. https://doi.org/10.1016/S0953-5438(99)00022-3.
K. S. Kim, “Information-seeking on the Web: Effects of user and task variables,” Libr. Inf. Sci. Res., vol. 23, no. 3, pp. 233–255, 2001. https://doi.org/10.1016/S0740-8188(01)00081-0.
M. Zajicek, “Successful and available: Interface design exemplars for older users,” Interact. Comput., vol. 16, no. 3, pp. 411–430, 2004. https://doi.org/10.1016/j.intcom.2004.04.003.
A. M. Figueroa, R. Juárez-Ramírez, S. Inzunza, and R. Valenzuela, “Implementing adaptive interfaces: A user model for the development of usability in interactive systems,” Comput. Syst. Sci. Eng., vol. 29, no. 1, pp. 95–104, 2014.
P. Zhang, “Integrating human-computer interaction development into SDLC: A methodology,” Proceedings of the Americas Conference on Information Systems AMCIS 2004, August 2004, pp. 1–7.
D. Stone, C. Jarrett, M. Woodroffe, and S. Minocha, User Interface Design and Evaluation, Published by Morgan Kaufmann, Los Altos, CA, 2005, xxviii + 669 p.
E. Zudilova-Seinstra, “On the role of individual human abilities in the design of adaptive user interfaces for scientific problem solving environments,” Knowl. Inf. Syst., vol. 13, no. 2, pp. 243–270, 2007. https://doi.org/10.1007/s10115-006-0061-3.
M. Bernard, C. H. Liao, and M. Mills, “The effects of fonttype and size on the legibility and reading time of online text by older adults,” CHI’01 Ext. Abstr. Hum. Factors Comput. Syst., pp. 175–176, 2001. https://doi.org/10.1145/634067.634173.
A. Karsvall, “Personality preferences in graphical interface design,” Proceedings of the Second Nord. Conference on Human-Computer Interaction, ACM, 2002, pp. 217–218. https://doi.org/10.1145/572020.572049.
V. Evers and D. Day, “The role of culture in interface acceptance,” Proceedings of the Hum. Comput. Interact. Interact’97, no. 1993, pp. 260–267, 1997. https://doi.org/10.1007/978-0-387-35175-9_44.
Z. Islam, M. Rahman, and K. Islam, “Online examination system in bangladesh context,” Sci. Environ. Technol., vol. 2, no. 3, pp. 351–359, 2013.
L. Rello, G. Kanvinde, and R. Baeza-Yates, “Layout guidelines for web text and a web service to improve accessibility for dyslexics,” Proceedings of the Int. Cross-Disciplinary Conf. Web Access W4A’12, 2012, p. 1. https://doi.org/10.1145/2207016.2207048.
R. H. Hall and P. Hanna, “The impact of web page text-background colour combinations on readability, retention, aesthetics and behavioural intention,” Behav. Inf. Technol., vol. 23, no. 3, pp. 183–195, 2004. https://doi.org/10.1080/01449290410001669932.
“Exam Layouts – What’s Best? – Etudes.” [Online]. Available at: http://etudes.org/exam-layout/.
N. A. Karim, Z. Shukur, and M. Ghazal, “Proposed features of online examination interface design,” Asian J. Inf. Technol., vol. 15, no. 16, pp. 2733-2736, 2016.
N. Abdel Karim and Z. Shukur, “Proposed features of an online examination interface design and its optimal values,” Comput. Human Behav., vol. 64, pp. 414–422, 2016. https://doi.org/10.1016/j.chb.2016.07.013.
V. López-Jaquero, F. Montero, J. P. Molina, P. González, and A. Fernández-Caballero, “A seamless development process of adaptive user interfaces explicitly based on usability properties,” Lect. Notes Comput. Sci., vol. 3425, pp. 289–291, 2005. https://doi.org/10.1007/11431879_19.
M. Just and D. Aspinall, “Personal choice and challenge questions: a security and usability assessment,” Proceedings of the 5th Symp. Usable Priv. Secur SOUPS’09, 2009, pp. 1–11. https://doi.org/10.1145/1572532.1572543.
J. Zraqou, W. Alkhadour, and A. Al-Nu’Aimi, “An efficient approach for recognizing and tracking spontaneous facial expressions,” Proceedings of the 2013 2nd Int. Conf. E-Learning E-Technologies Educ. ICEEE 2013, pp. 304–307, 2013. https://doi.org/10.1109/ICeLeTE.2013.6644393.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.