The Usability of Two-Factor Authentication in Support of Effective Information Preservation and Network Security

Authors(2) :-Matchani Gopi Krishna, P S Naveen Kumar

In the present digital day with momentous improvement in Computer segment, Single factor confirmation, e.g. passwords, is no more analysed as secure in the World Wide Web. It has never been less troublesome in Securing the system and remote access. Basic, evident and simple to-figure passwords, for example, names and age, are easily discovered through mechanized mystery key social event programs. The security and protection dangers through malware are dependably continually becoming both in amount and also quality. Extended access to data expands shortcoming to hacking, splitting of passwords and online fakes. In this affiliation the customary login/watchword authentication is considered insufficiently secure for a few security-basic applications, for example, login to Mailing Accounts, Social Networks, Gadgets, Financial records, official secured systems, and business sites online and so forth. Obliging more than one autonomous factor builds the trouble of giving false certifications. Two-factor confirmation proposition ensure a higher security level by broadening the single authentication factor. This paper concentrates on the usage of two-factor confirmation techniques by utilizing the two clients inviting customary Alphanumeric Password and graphical Password as portal for authentication. An attempt has been made by utilizing two factors Authentication, and in this paper we portray the two factor Authentication system outline and plan execution. Along these lines managing an extra secret word includes an additional layer of security.

Authors and Affiliations

Matchani Gopi Krishna
PG Student, Dept of MCA, St.Ann's College of Engineering & Technology, Chirala, Andhra Pradesh, India
P S Naveen Kumar
Assistant Professor, Dept of MCA, St.Ann's college of Engineering & Technology, Chirala, Andhra Pradesh, India

Authentication, Password, Alphanumeric Password, Graphical Password, Secured Login, Network Security, Data Protection.

  1. SharifahMumtazah Syed Ahmad, et al "TechnicalIssues and Challenges of Biometric Applications as access control tools of Information Security"International Journal of Innovative Computing, Information and Control Vol8, No. 11, pp 7983 ? 7999Nov 2012.
  2. Sans Securing the Human "Two FactorAuthentication" the monthly Security awareness newsletter for computer users November 2012.
  3. Haichang Gao, Wei Jia, Fei Ye, Licheng Ma "Asurvey on the use of Graphical Passwords inSecurity", Journal of software, Vol. 8, No. 7, July2013.
  4. Rahul Kale, Neha Gore, Kavita, NileshJadhav,SwapnilShinde " Review Paper on Two FactorAuthentication Using Mobile Phone" InternationalJournal of Innovative research and Studies, Vol. 2,Issue 5, pp. 164 - 170, May 2013.
  5. Alexandra Dmitrienko, Christopher Liebchen,Christian Rossow, and Ahmad-Reza Sadeghi "On the(In) Security of Mobile Two-Factor Authentication" Lecture Notes in Computer Science, pp. 365-383, Nov2014.
  6. Jeff Yan, Alan Blackwell, Ross Anderson, AlasdairGrant "Password Memorability and Security:Empirical Results" IEEE security and privacy Vol.2, Issue: 5, pp. 25 - 31, 2004.
  7. Dinei Florencio, Cormac Herley " A Large-ScaleStudy of Web Password Habits" Proceedings of the 16th international conference on the World WideWeb, ACM Digital Library, pp 657-666, 2007.
  8. Andrew Kemshall, Phil Undewood "White paper -Options for Two Factor Authentication" SecurEnvoyJuly 2007.
  9. Alireza Pirayesh Sabzevar, Angelos Stavrou "Universal Multi-Factor Authentication Using Graphical Passwords", Proceedings of the 2008 IEEEInternational Conference on Signal Image Technologyand Internet Based Systems. pp. 625-632, 2008.
  10. Ziqing Mao, Dinei Florencio, and Cormac Herley"Painless Migration from Passwords to Two FactorAuthentication" in 'WIFS' , IEEE, Brazil, pp. 1-6, Nov29th-Dec 2nd, 2011.
  11. ManavSinghal and ShashikalaTapaswi "SoftwareTokens Based Two Factor Authentication Scheme"International Journal of Information and ElectronicsEngineering, Vol. 2, No. 3, pp. 383 - 386, May 2012.
  12. Olufemi Sunday Adeoye "Evaluating the Performanceof two-factor authentication solution in the BankingSector" IJCSI International Journal of ComputerScience Issues, Vol. 9, Issue 4, No 2, July 2012.
  13. Goode intelligence "Two Factor Authentication Goes Mobile" www.goodeintelligence.com, September2012.
  14. http://www.oneid.com/wpcontent/up loads/2014/05/OneID_WhitePaper_Adv-of-Integrated-2FA-final.pdf.
  15. McAfee Case Study "Securing the Cloud with Strong Two-Factor Authentication through McAfee OneTime Password" http://www.mcafee.com /in/ casestudies/cs-cloudalize.aspx.

Publication Details

Published in : Volume 4 | Issue 2 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1566-1570
Manuscript Number : IJSRST1841503
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Matchani Gopi Krishna, P S Naveen Kumar, " The Usability of Two-Factor Authentication in Support of Effective Information Preservation and Network Security", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 4, Issue 2, pp.1566-1570, January-February-2018.
Journal URL : https://ijsrst.com/IJSRST1841503
Citation Detection and Elimination     |      | | BibTeX | RIS | CSV

Article Preview