A 3-LEVEL MULTIFACTOR AUTHENTICATION SCHEME FOR CLOUD COMPUTING
Journal Title: International Journal of Computer Engineering & Technology (IJCET) - Year 2019, Vol 10, Issue 1
Abstract
The objective of this paper is to propose a secure, user friendly and economical multi-level authentication scheme that uses multiple factors for gaining access to resource on insecure platforms and for financial transactions. The proposed study is based on a premise that when multiple levels and multiple factors are incorporated in an authentication scheme it not only becomes difficult to break but also resistant to different forms of attacks. This work purposes a scheme where authentication process is carried out in three levels using multiple factors and is called 3L-MFA. The scheme also uses Out of Band (OOB) authentication as one of the factors that offers credible security against man-in-the-middle (MIM) attack. The first level uses username password based on double encryption. Second level uses OTP verification based on Out of Band (OOB) authentication using email id and mobile number. Third level involves user’s interaction on graphical screen in terms of predetermined number of clicks on images, buttons and selection of predetermined number of menu items. The security of proposed system depends upon double encryption using SHA-1 and AES128-CBC, out of band authentication using OTP and user interaction on a graphical screen that uses probability combination of various numbers.
Authors and Affiliations
CHARANJEET SINGH and TRIPAT DEEP SINGH
A REVIEW ON DATA MINING AND BIGDATA
The recent years have seen an exponential growth of data generation this enormous amount of data has brought new kind of problem. The existing data mining techniques are unable to process the Big Data or they are not e...
IMPLEMENTATION OF NAÏVE BAYESIAN DATA MINING ALGORITHM ON DECEASED REGISTRATION DATA
The use of data mining algorithm in different domains like marketing, finance, retail, cyber security, fraud detection, medical science, etc…is well known. In recent times, the data mining is also implemented for e-gov...
A ROBUST ORGANIZATIONAL POLICY FOR TASK AND RESOURCE ALLOCATION: A NOVEL FRAMEWORK
In a Multi-Agent System existing formalisms for implementing organizational policies assign specific roles to each agent. Examples are hierarchical organization, contract net protocol, social reasoning mechanism, and t...
AN APPROACH FOR PREDICATION OF COMPLICATIONS WOMEN FIGHTS DURING MATERNAL PERIOD
Pregnancy and motherhood are natural processes in the lives of women. One of the great feelings for every woman is begin a Mother, but maternal period is very much susceptible for health issues. Some old illnesses may...
FACE RECOGNITION IMPLEMENTATION ON RASPBERRYPI USING OPENCV AND PYTHON
Distinguishing an individual with a picture has been advanced through the broad communications. Be that as it may, it is less powerful to unique finger impression or retina examining. This report depicts the face detec...