Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication ? Research Paper
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)Publication Date: 2015-11-05
Authors : Harvinder Singh; Amandeep Kaur;
Page : 231-236
Keywords : Cloud Storage; Access Control Model; Attribute based signatures; Multi-tier authentication; Graphical authentication;
Abstract
In case, somebody once see a user entering the graphical password can easily remember or guess the pattern and can take access to the device. Our major goal is to overcome this security issue and to use the password on the cloud platforms for the administrator panels for various cloud applications. Using this password scheme, the touch screen friendly secure administration interfaces can be developed to give the administrators an easy access to the administration panel. In this research, a multi-level password authentication scheme has been proposed for the administrator panels, where the administrators would be prompted to enter the first-level password at first and second-level password can be used to access more critical administration areas in order to protect the power user accounts from hacking attempts. A user when signup creates and stores a pattern by joining the number points or by selecting the images to create a password, the password is converted into a hash which is further sent to the server for the authentication purposes. The server returns the decision logic which is responsible to accept or deny the login request. To gain the access to the device, the user has to remember the graphical passwords and need to enter the same sequence every time drawing a pattern. The proposed scheme has been evaluated as effective, robust, ease of access and wide adaptability of the scheme for the various smart phone platforms. The proposed scheme has been evaluated under various situations. Both of the graphical password schemes have been evaluated individually with various password combinations. The new multi-level graphical password scheme can be considered as a secure scheme for cloud platforms.
Other Latest Articles
- A Dynamic Two key Factor Technique Security Adoption in WSN (Improved LEACH)
- Dictionary Based Renovation from Minuzie to Image
- Diversity Status and Population Dynamics of Phytoplankton at Laxmiwadi Tank from Kolhapur District of Maharashtra, India
- Characterization and Antimicrobial Study of Nickel Nanoparticles Synthesized from Dioscorea (Elephant Yam) by Green Route
- Dynamic Bayesian Belief Network for Modeling Student Knowledge Tracing
Last modified: 2021-07-01 14:26:37