International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 92 - Number 7 |
Year of Publication: 2014 |
Authors: Sangeeth Kumar. S, R. Venkatesan |
10.5120/16024-5066 |
Sangeeth Kumar. S, R. Venkatesan . Ranking of Authentication Schemes based on Critical Limiting Factors. International Journal of Computer Applications. 92, 7 ( April 2014), 34-40. DOI=10.5120/16024-5066
In any of the computing environment ranging from a traditional computing to the emerging service based computing, security and privacy has been an important consideration in the architecture. Particularly user authentication is an entry point to almost each and every application and services published. Extensive research work in user authentication has yielded several authentication schemes but the existing schemes focuses largely on the benefits rather than their downside in terms of security, usability and deploying ability, which are found to be ineffective when deployed in the real world. To overcome this issue, a ranking model is proposed in this paper that analyzes the authentication scheme based on their limitations and gives a prioritized scheme based on which the best mechanism at a particular instance of time could be chosen and implemented.