International Journal of Computer Applications
In last few years, the data usage from internet has been increased at very high rate. The adaption of cloud in business organizations increased exponentially. But unfortunately the attacks on that data and transactions are also increasing. As the every authorized user has their own username and password to access their personal accounts, but as these details can be misused by an authorized user so there is a requirement of additional authentication step. The combination of keystroke biometric, voice authentication and cryptography is more efficient to authenticate the user and provide more security.