CFP last date
20 December 2024
Reseach Article

Multi-Factor Graphical Password for Cloud Interface Authentication Security

by Ramandeep Kaur, Amanpreet Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 125 - Number 7
Year of Publication: 2015
Authors: Ramandeep Kaur, Amanpreet Kaur
10.5120/ijca2015905957

Ramandeep Kaur, Amanpreet Kaur . Multi-Factor Graphical Password for Cloud Interface Authentication Security. International Journal of Computer Applications. 125, 7 ( September 2015), 32-35. DOI=10.5120/ijca2015905957

@article{ 10.5120/ijca2015905957,
author = { Ramandeep Kaur, Amanpreet Kaur },
title = { Multi-Factor Graphical Password for Cloud Interface Authentication Security },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 125 },
number = { 7 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume125/number7/22446-2015905957/ },
doi = { 10.5120/ijca2015905957 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:15:25.354463+05:30
%A Ramandeep Kaur
%A Amanpreet Kaur
%T Multi-Factor Graphical Password for Cloud Interface Authentication Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 125
%N 7
%P 32-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As the trend of mobile devices is on the rise, every kind of internet application is being easily accessible locally using mobile apps. The proposed technique will be using one-level double-trap image based authentication for the login protection in cloud platforms on mobile devices. The one-level authentication scheme consists of various small images, which are made of single numerical or alphabetical characters each, in 3x3 point grid formation. The second level password is a 9 clue-points grid based password scheme for pattern passwords. The pattern password input grid is in the static arrangement and does not change at any point of time. The traditional 9 clue-point scheme will additionally allow the overlapping patterns, hence they are prone to the shoulder surfing attacks, whereas the proposed scheme is based on shuffling geometrical shape and the overlapping password pattern to mitigate the threat of shoulder surfing attacks.

References
  1. Bashier, H. K., Hoe, L. S., & Han, P. Y. “Graphical Password: Pass-Images Edge Detection”, In Signal Processing And Its Applications (CSPA), IEEE 9th International Colloquium , Pp. 111-116 , 2013.
  2. Dinesha, H. A., And V. K. Agrawal. "Multi-Level Authentica tion Technique For Accessing Cloud Services." Computing, Com munication And Applications (ICCCA), 2012 International Conference On.IEEE, Pp 1-4, 2012.
  3. Hussain, Abdulameer. "Enhanced Authentication Mechanism Using Multilevel Security Model." Int. Arab J. E-Technol. V.1.2 , Pp 49-57,2009.
  4. Ku, Wei-Chi, Dum-Min Liao, Chia-Ju Chang, And Pei-Jia Qiu. "An Enhanced Capture Attacks Resistant Text-Based Graphical Password Scheme." In Communications In China (ICCC), IEEE/CIC International Conference On, Pp. 204-208, 2014.
  5. Renaud, K., Mayer, P., Volkamer, M., & Maguire, J. “Are Graphical Authentication Mechanisms As Strong As Passwords” In Computer Science And Information Systems (Fedcsis), Federated Conference On Pp. 837-844, 2013.
  6. Revar, A. G., & Bhavsar, M. D. “Securing User Authentication Using Single Sign-On In Cloud Computing” In Engineering (Nuicone), Nirma University International Conference On Pp. 1-4, 2011.
  7. Shraddham. Gurav, “Graphical Password Authentication”, ICESSPCT, Vol. 1, Pp. 479-483,2014.
  8. Singh, M., & Singh, S. “Design And Implementation Of Multi-Tier Authentication Scheme In Cloud” IJCSI International Journal Of Computer Science Issues, 9(5), Pp. 87-90.
  9. Tao, Hai, And Carlisle Adams. "Pass-Go: A Proposal To Improve The Usability Of Graphical Passwords." IJ Network Security 7, Pp.273-292.2 ,2008.
  10. Tanvi Naik, Sheetal Koul, “Multi-Dimensional And Multi-Level Authentication Techniques”, IJCA ,Vol. 75, Issue 12, Pp.17-22, 2013.
  11. Yi-Lun Chen, Wei-Chi Ku, Yu-Chang Yeh, Dun-Min Liao, “A Simple Text-Based Shoulder Surfing Resistant Graphical Password”, ISNE, Vol. 1, Pp. 161-164,2013.
  12. Revathy Gangadaren M And Lijo V P.. Article: Cloud Based Spatial Cloaking For Mobile User Privacy Preservation. International Journal Of Applied Information Systems 4(5) , Pp. 39-432012.
  13. Umanandhini, D., Tamilselvan, L., Udhayakumar, S., & Vijayasingam, T. “Dynamic Authentication For Consumer Supplies In Mobile Cloud Environment” In Computing Communication & Networking Technologies (ICCCNT) ,Pp. 1-6,2012.
  14. Zhao, Xi, Tao Feng, And Weidong Shi. "Continuous Mobile Authentication Using A Novel Graphic Touch Gesture Feature." In Biometrics: Theory, Applications And Systems (BTAS), IEEE Sixth International Conference On, Pp. 1-6,2013.
  15. Uellenbeck, S., Dürmuth, M., Wolf, C., & Holz, T. “Quantifying The Security Of Graphical Passwords: The Case Of Android Unlock Patterns” In Proceedings Of The 2013 ACM SIGSAC Conference On Computer & Communications Security ,Pp. 161-172.
Index Terms

Computer Science
Information Sciences

Keywords

Graphical Authentication Cue-points pattern lock pattern password cloud authentication mobile authentication.