CFP last date
21 October 2024
Reseach Article

Enhance Security Methods for Identifying Users without their Login Ids

by Pallavi M. Ingale, Girish Kumar Patnaik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 150 - Number 8
Year of Publication: 2016
Authors: Pallavi M. Ingale, Girish Kumar Patnaik
10.5120/ijca2016911611

Pallavi M. Ingale, Girish Kumar Patnaik . Enhance Security Methods for Identifying Users without their Login Ids. International Journal of Computer Applications. 150, 8 ( Sep 2016), 31-37. DOI=10.5120/ijca2016911611

@article{ 10.5120/ijca2016911611,
author = { Pallavi M. Ingale, Girish Kumar Patnaik },
title = { Enhance Security Methods for Identifying Users without their Login Ids },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 150 },
number = { 8 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 31-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume150/number8/26115-2016911611/ },
doi = { 10.5120/ijca2016911611 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:55:27.079210+05:30
%A Pallavi M. Ingale
%A Girish Kumar Patnaik
%T Enhance Security Methods for Identifying Users without their Login Ids
%J International Journal of Computer Applications
%@ 0975-8887
%V 150
%N 8
%P 31-37
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication to a computer system is divided in to two mechanisms, identification and verification. For identification the login IDs have been used and for verification password can be used. The existing password based system can be augmented by strengthening the identification process. Instead of a login ID identification process utilizes personal secret data to identify a user uniquely. The identification process asks the user to choose a correct login ID among multiple choices of partially obscured IDs. Since, identification process does not accept a login ID during the authentication process. For gaining an access to the computing system a stolen or cracked password cannot be used, unless a correct identification material is provided by attacker. Hence in this paper, the three step verification process is provided to enhance the security. The security will be provided using user authentication and device authentication by an authentication methods.

References
  1. Joseph Bonneau, cormac Herley, Paul C van Oorschot,and Frank Stajano, “The Quest to Replace Passwords: AFramework for Comparative Evaluation of Web Authentication Schemes", 2012, IEEE Symposium onSecurity and Privacy, pp. 553 – 567.
  2. Alon Schclar, Lior Rokach, Adi Abramson, and YuvalElovici, “User Authentication Based on RepresentativeUsers, IEEE Transactions on Systems, Man, And Cybernetics Part C: Applications and Reviews", Vol. 42,No. 6, November 2012, pp. 1669 - 1678.
  3. Nikos Komninos, Emmanouil Georgakakis, Christos“NAVI: Novel Authentication with Visual Information,IEEE Symposium on Computers and Communications",2012, pp. 588 - 595.
  4. Bob Zhang, Wei Li, Pei Qing, and David Zhang, “PalmPrint Classification by Global Features", IEEETransactions on Systems, Man, And Cybernetics: systemsVol. 43, No. 2, March 2013, pp. 370 378.
  5. Jaeseok Yun, Gregory Abowd, Woontack Woo, JehaRyu, “Biometric User Identification with Dynamic Footprint”, 2007, 2nd Intl Conference on Bio-InspiredComputing: Theories and Applications, pp. 225-230.
  6. P. M. Gomathi, Dr. G. M. Nasira , “A Survey on Biometrics based Key Authentication using Neural Network”, Double Blind Peer Reviewed InternationalResearch Journal, Volume 11 Issue 11 Version 1.0 July 2011.
  7. Farnaz Towhidi, Azizah Abdul Manaf, Salwani MohdDaud, Arash Habibi Lashkari, “The Knowledge BasedAuthentication Attacks", University Technology Malaysia (UTM), 2010, pp. 765 - 775.
  8. Priti C. Golhar, Dr. D.S. Adane, “Graphical KnowledgeBased Authentication Mechanism", ISSN, Volume 2,Issue 10, October 2012, pp. 48 - 54.
  9. Sonia Chiasson, Elizabeth Stobert, Alain Forget,Persuasive Cued Click-Points: Design, Implementation,and Evaluation of a Knowledge-Based AuthenticationMechanisms”, IEEE TRANSACTIONS ONDEPENDABLE AND SECURE COMPUTING, VOL. 9,No.2, MARCH/APRIL 2012, pp. 222 - 235.
  10. Muhammad Daniel Hafiz, Abdul Hanan Abdullah,Norafida Ithnin, “Towards Identifying Usability and Security Features of Graphical Password in KnowledgeBased Authentication Technique", 2008, IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Cybersecurity Authentication Identification Password.