Author : Aakansha S Wani 1
Date of Publication :7th April 2016
Abstract: Authentication is considered as a significance element of security to verify user’s identity. There are many authentication schemes that depend on user name /password, but they are considered weak techniques of user authentication because they are prone to dictionary attack and man in middle attack, etc. A more secure scheme is 2 factor authentications that does not only verify the user name /password pair, but also needs a second factor such as a token device, biometric. This paper proposes a technique for password generation and authentication using Digital Signature and Biometric factor i.e Fingerprint which can withstand common security attacks as well and has good performance over user authentication.
Reference :
-
- Comparative Study on Authentication Schemes for Cloud Computing Shikha Choksi © 2014 IJEDR | Volume 2, Issue 2 | ISSN: 2321-9939.
- A Novel Digital Content Protection Scheme Combining Iris Identity Based Digital Signature and Semi-fragile Watermark,Meihua Wang,Kefeng Fan,Xiaoji Li, Qingning Zeng
- Yassin, A.A.; Hai J.; Ibrahim, A.; Weizhong Q. and Deqing Z., "A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing", Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2012 IEEE 26th International, pp.1210-1217, 21-25 May 2012
- An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation Jiangshan Yu, Guilin Wang, Yi Mu, Senior Member, IEEE, and Wei Gao
- User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services,Reza Fathi ∗ , Mohsen Amini Salehi † , and Ernst L. Leiss .2015 IEEE 8th International Conference on Cloud Computing.
- Tianfield, H., "Security issues in cloud computing", Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on, pp.1082-1089, 14-17 Oct. 2012.
- Lamport, L., "Password Authentication with Insecure Communication", Communications of the ACM 24.11, pp.770-772, Nov. 1981.
- Choudhury, A.; Kumar, P.; Sain, M.; Lim, H. and Hoon Jae-Lee, "A Strong User Authentication Framework for Cloud Computing", Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific, pp.110-115, 12-15 Dec. 2011
- Xuguang, R. and Xin-Wen, W., "A novel dynamic user authentication", Communications and Information Technologies (ISCIT), 2012 International Symposium on, pp.713-717, 2-5 Oct. 2012.
- Forouzan, B., Cryptography and Network Security (Sie), Tata McGraw-Hill Education, 2011, pp.416-421, ISBN 9780070660465.
- Guo, M.; Liaw, H.; Hsiao, L.; Huang, C.; and Yen, C., "Authentication using graphical password in cloud", Wireless Personal Multimedia Communications (WPMC), 2012 15th International Symposium on , pp.177-181, 24-27 Sept. 2012.
- Khitrov M., "Talking passwords: voice biometrics for data access and security", Biometric Technology Today, Volume 2013, Issue 2, February 2013, Pages 9-11, ISSN 0969-4765, http://dx.doi.org/10.1016/S0969- 4765(13)70036-5.
- M'Raihi, D., Bellare, M., Hoornaert, F., Naccache, D., and O. Ranen, "HOTP: An HMAC-Based One-Time Password Algorithm", RFC 4226, December 2005.
- D., M'Raihi, S., Machani, M., Pei and J., Rydell, "TOTP: Time-Based One-Time Password Algorithm", RFC 6238, May 2011.
- Chen, T.; Yeh, H. and Shih, W., "An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing", Multimedia and Ubiquitous Engineering (MUE), 2011 5th FTRA International Conference on, pp.155-159, 28-30 June 2011.
- Yassin, A.A.; Hai J.; Ibrahim, A.; Weizhong Q. and Deqing Z., "A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing", Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2012 IEEE 26th International, pp.1210-1217, 21-25 May 2012.
- Jaidhar, C.D., "Enhanced Mutual Authentication Scheme for Cloud Architecture", Advance Computing Conference (IACC), 2013 IEEE 3rd International, pp.70-75, 22-23 Feb. 2013 doi: 10.1109/IAdCC.2013.6514197.