The Usability of Two-Factor Authentication in Support of Effective Information Preservation and Network Security

Authors

  • Matchani Gopi Krishna  PG Student, Dept of MCA, St.Ann's College of Engineering & Technology, Chirala, Andhra Pradesh, India
  • P S Naveen Kumar  Assistant Professor, Dept of MCA, St.Ann's college of Engineering & Technology, Chirala, Andhra Pradesh, India

Keywords:

Authentication, Password, Alphanumeric Password, Graphical Password, Secured Login, Network Security, Data Protection.

Abstract

In the present digital day with momentous improvement in Computer segment, Single factor confirmation, e.g. passwords, is no more analysed as secure in the World Wide Web. It has never been less troublesome in Securing the system and remote access. Basic, evident and simple to-figure passwords, for example, names and age, are easily discovered through mechanized mystery key social event programs. The security and protection dangers through malware are dependably continually becoming both in amount and also quality. Extended access to data expands shortcoming to hacking, splitting of passwords and online fakes. In this affiliation the customary login/watchword authentication is considered insufficiently secure for a few security-basic applications, for example, login to Mailing Accounts, Social Networks, Gadgets, Financial records, official secured systems, and business sites online and so forth. Obliging more than one autonomous factor builds the trouble of giving false certifications. Two-factor confirmation proposition ensure a higher security level by broadening the single authentication factor. This paper concentrates on the usage of two-factor confirmation techniques by utilizing the two clients inviting customary Alphanumeric Password and graphical Password as portal for authentication. An attempt has been made by utilizing two factors Authentication, and in this paper we portray the two factor Authentication system outline and plan execution. Along these lines managing an extra secret word includes an additional layer of security.

References

  1. SharifahMumtazah Syed Ahmad, et al "TechnicalIssues and Challenges of Biometric Applications as access control tools of Information Security"International Journal of Innovative Computing, Information and Control Vol8, No. 11, pp 7983 ? 7999Nov 2012.
  2. Sans Securing the Human "Two FactorAuthentication" the monthly Security awareness newsletter for computer users November 2012.
  3. Haichang Gao, Wei Jia, Fei Ye, Licheng Ma "Asurvey on the use of Graphical Passwords inSecurity", Journal of software, Vol. 8, No. 7, July2013.
  4. Rahul Kale, Neha Gore, Kavita, NileshJadhav,SwapnilShinde " Review Paper on Two FactorAuthentication Using Mobile Phone" InternationalJournal of Innovative research and Studies, Vol. 2,Issue 5, pp. 164 - 170, May 2013.
  5. Alexandra Dmitrienko, Christopher Liebchen,Christian Rossow, and Ahmad-Reza Sadeghi "On the(In) Security of Mobile Two-Factor Authentication" Lecture Notes in Computer Science, pp. 365-383, Nov2014.
  6. Jeff Yan, Alan Blackwell, Ross Anderson, AlasdairGrant "Password Memorability and Security:Empirical Results" IEEE security and privacy Vol.2, Issue: 5, pp. 25 - 31, 2004.
  7. Dinei Florencio, Cormac Herley " A Large-ScaleStudy of Web Password Habits" Proceedings of the 16th international conference on the World WideWeb, ACM Digital Library, pp 657-666, 2007.
  8. Andrew Kemshall, Phil Undewood "White paper -Options for Two Factor Authentication" SecurEnvoyJuly 2007.
  9. Alireza Pirayesh Sabzevar, Angelos Stavrou "Universal Multi-Factor Authentication Using Graphical Passwords", Proceedings of the 2008 IEEEInternational Conference on Signal Image Technologyand Internet Based Systems. pp. 625-632, 2008.
  10. Ziqing Mao, Dinei Florencio, and Cormac Herley"Painless Migration from Passwords to Two FactorAuthentication" in 'WIFS' , IEEE, Brazil, pp. 1-6, Nov29th-Dec 2nd, 2011.
  11. ManavSinghal and ShashikalaTapaswi "SoftwareTokens Based Two Factor Authentication Scheme"International Journal of Information and ElectronicsEngineering, Vol. 2, No. 3, pp. 383 - 386, May 2012.
  12. Olufemi Sunday Adeoye "Evaluating the Performanceof two-factor authentication solution in the BankingSector" IJCSI International Journal of ComputerScience Issues, Vol. 9, Issue 4, No 2, July 2012.
  13. Goode intelligence "Two Factor Authentication Goes Mobile" www.goodeintelligence.com, September2012.
  14. http://www.oneid.com/wpcontent/up loads/2014/05/OneID_WhitePaper_Adv-of-Integrated-2FA-final.pdf.
  15. McAfee Case Study "Securing the Cloud with Strong Two-Factor Authentication through McAfee OneTime Password" http://www.mcafee.com /in/ casestudies/cs-cloudalize.aspx.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Matchani Gopi Krishna, P S Naveen Kumar, " The Usability of Two-Factor Authentication in Support of Effective Information Preservation and Network Security, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 2, pp.1566-1570, January-February-2018.