Open Access Open Access  Restricted Access Subscription or Fee Access

Enhanced Graphical Password System with Intelligent User Identification Model

Athira S, S. Dhanabal, K. M. Ravikumar

Abstract


Data and authorization security needed everywhere. In case dealing with huge number of data in a cloud server, secured logging is must. This is due to the fact that cloud servers are freely accessible from anywhere at any time. As a result, data should be well-protected against intruders, hackers, and unauthorized users. Furthermore, because log data files frequently contain sensitive information, log records' secrecy and privacy are equally vital. At all times, the integrity of the log files and the logging process must be ensured. The main objective of this project is to develop a secured logging as a service with graphical password authentication method in cloud architecture. So, in the proposed method, privacy and preservation methods are enhanced. Correctness, confidentiality, data logs, privacy, preservation, and virtual private server (VPS) are the six key functions of protected logging (Virtual proxy server). The accuracy is concerned with historical data that is correct. Confidentiality refers to information that isn't displayed during a search. Data logs are used to identify relevant users based on their data history. File linking and data access history are part of the privacy system. The term "preservation" refers to the use of a more advanced color coding. Finally, the proxy server for virtual data access is handled by VPS. In the cloud architecture, there isn't much of a difference between hackers and intruders. Hackers come from different networks, whereas invaders come from the same networks. Intruders cannot be avoided, but hackers may be avoided. This is due to the possibility that intruders are aware of the network. This is because intruders may have prior information of the network into which they intend to break in. As a result, secure logging as a service is critical for all types of cloud server environments in order to ensure correct login for authorized users while preventing unauthorized users from logging.

Full Text:

PDF

References


Basak Bilgi,.trBulentTugrul,” A Shoulder-Surfing Resistant Graphical Authentication Method” 2018 IEEE.

Bilal Eid Fayyadh ,Khalid Mansour,Khaled W. Mahmoud ,” A New Password Authentication Mechanism Using 2D Shapes” 2018 8th International Conference on Computer Science and Information Technology (CSIT).

Chao Shen ,Yufei Chen, Yao Liu and Xiaohong Guan,” Adaptive Human–Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference”- IEEE Transactions On Neural Networks And Learning Systems.IEEE 2018.

Deepika Gupta,Dr. Vishal Goar, Akhand Pratap Singh,Shikha Mathur,” Combination Of Textual And Graphical Based Authentication Scheme Through Virtual Environment”- 2017 IEEE.

K.PriyaT.Venkaiah Naidu R.VamsiKrishna

,” An Advanced Information Security System Using Image Based Graphical Password Scheme”- 2nd International Conference on Trends in Electronics and Informatics (ICOEI 2018).

L.Gunaseeli, Dr.R.Aroul Canessane.” GRAPHICAL PASSWORDS IMPLIES ON TOLERANCE PASSWORD, IMAGE CHOICE, AND PUZZLE LOGIN SECURITY”- international conference on information,communication& embedded systems (ICICES2017).

Misbah UrrahmanSiddiqui,Mohd. Sarosh Umar, Miftah Siddiqui,” A Novel Shoulder-Surfing Resistant Graphical Authentication Scheme”- 2018 4th International Conference on Computing Communication and Automation (ICCCA), IEEE 2018.

Nida asmath,” Conundrum – Pass: A New Graphical Password Approach. "-International conference on communication. IEEE 2019.

Noor Ashitah Abu Othman, Anis Shobirin Abdullah Sani, Muhammad Akmal Abdul Rahman, Fakariah Hani Mohd Ali,” Directional Based Graphical Authentication Method with Shoulder Surfing Resistant”- 2018 IEEE Conference on Systems, Process and Control (ICSPC 2018), 14– 15 December 2018, Melaka,Malaysia.

P. A. Sosa-Valles, J. G. Villalobos-Serrano, P. Velarde-Alvarado, V. García, J. R. Parra-Michel,L.

Mena, R. Martínez-Peláez,” My Personal Images as My Graphical Password”- IEEE Latin America Transactions, VOL. 16, NO. 5, MAY 2018.

P. Baskaran, Anurag.EG, Kaviyarasu.S, Eniyavan.AV,Karthikeyan.M,” TIME SLOT BASED DATA SHARING WITH TIME SLOT BASED PASSWORD”- 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).IEEE2017.

R. Sudha, M. Shanmugaratnam,” An Improved Graphical Authentication System to Resist the Shoulder Surfing Attack”. 2019 International Conference on Technical Advancements in Computers andCommunications.

Prabhakaran, M.V. Ranjith Kumar,” ADVANCED GRAPHICAL PASSWORDS USING CAPTCHA”- International Journal of Pure and Applied Mathematics Volume 118 No. 22 2018, 351-357.

Siva Janaki Raman, Karunya Sri V S, ChathuryaPulluri, Sundararajan Rajagopalan, K Thenmozhi, and RengarajanAmirtharajan,” Numerical Password via Graphical Input – An Authentication System on Embedded Platform”- 2017 International Conference on Computer Communication and Informatics (ICCCI -2017), Jan. 05 – 07, 2017, Coimbatore,INDIA.

Sung-Shiou Shen, Tsai-Hua Kang, Shen-Ho Lin & Wei Chien,” Random Graphic User Password Authentication Scheme in Mobile Devices”- International Conference on Applied System Innovation. 2017 IEEE.

Tamajit Bhattacharya, Pushpender Sharma, MS. Sheetal Joshi; Dr. Shilpi Sharma- “Authentication Aura to Secure Graphical Password: The Case of Android Unlock Pattern”- International Journal of Computer Science and Mobile Computing, Vol.8 Issue.3, March-2019,

TowseefAkram, Vakeel Ahmad, IsrarulHaq, Monisa Nazir,” Graphical Password Authentication”- International Journal of Computer Science and Mobile Computing, Vol.6 Issue.6, June-2017.

WantongZheng, ChunfuJia,“CombinedPWD: ANewPasswordAuthenticationMechanismusingSeparators betweenKeystrokes”-2017 13th International Conference on Computational Intelligence and Security.IEEE2017.

Wenjian Luo, Yamin Hu, Hao Jiang, and Junteng Wang,” Authentication by Encrypted Negative Password” 2018 IEEE,Transactions on Information Forensics and Security. IEEE2018.

Yeeun Ku, Leo Hyun Park, Sooyeon, And Taekyoung Kwon” Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication”, 2019 IEEE. VOLUME 7,2019.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Trends in Opto-Electro and Optical Communications