SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Kamlesh Gupta.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 4) April 2016, pp.100-103
www.ijera.com 100|P a g e
Database Security Two Way Authentication Using Graphical
Password
Kamlesh Gupta#1
, Arshad Malik#2
, Shamal Pawar#3
, Jijnasa Patil *4
#
Dept. Of Computer Engineering,Veermata Jijabai Technological Institute Mumbai, Maharashtra (India)
*
Assistant Professor, Dept. Of Computer Engineering,Veermata Jijabai Technological Institute Mumbai,
Maharashtra (India)
ABSTRACT
As data represent a key asset for today's organizations. The problem is that how to protect this data from
attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data
security techniques are available to protect database and computing infrastructure, many such as network
security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in
organization who can try to access the sensitive data. This paper proposes a two-way authentication method
which fuses knowledge-based secret and personal trait information.
I. INTRODUCTION
Human factors are often considered the
weakest link in a computer security system.
Patrick, et al. [1] point out that there are three
major areas where human computer interaction is
important: authentication, security operations, and
developing secure systems. Here we focus on the
authentication problem.
The vulnerabilities of this method have
been well known. One of the main problems is the
difficulty of remembering passwords. Studies have
shown that users tend to pick short passwords or
passwords that are easy to remember [2].
Unfortunately, these passwords can also be easily
guessed or broken. According to recent new
computer world article, the security team at a large
company ran a network password cracker and
within 30 seconds, they identified about 80% of the
passwords [3]. On the other hand, passwords that
are hard to guess or break are often hard to
remember. Studies showed that since user can only
remember a limited number of passwords, they
tend to write them down or will use the same
passwords for different accounts [4, 5].
To address the problem with tradition user name
and password authentication, we will focus on
alternative using two way authentication using
graphical password and one time password.
II. BACKGROUND
2.1 Classification of Current Authentication
Methods
A. Token based Authentication
It is based on something that user possess.
For example Smart Cards, a driver’s license, credit
card, a university ID card etc. It allows the users to
enter the username and password which allocate
the token to the user and allow the user to access
The resources without entering the
username and password. Once their token has been
obtained, the user can offer the token - which offers
access to a specific resource for a time period - to
the remote site [6]. Many token based
authentication systems also use knowledge based
techniques to enhance security [7].
Figure1 Classification of Authentication [8]
RESEARCH ARTICLE OPEN ACCESS
Kamlesh Gupta.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 4) April 2016, pp.100-103
www.ijera.com 101|P a g e
B. Biometric Based Authentication
It is based on “Something you are”.
Biometrics is the study of automated methods for
uniquely recognizing humans based upon one or
more intrinsic physical or behavioral traits. It uses
physiological or behavioral characteristics like
fingerprint or facial scans and iris or voice
recognition to identify users. A biometric scanning
device takes a user's biometric data, such as an iris
pattern or fingerprint scan, and converts it into
digital information a computer can interpret and
verify. A biometric-based authentication system
may deploy one or more of the biometric
technologies: voice recognition, fingerprints, face
recognition, iris scan, infrared facial and hand vein
thermo grams, retinal scan, hand and finger
geometry, signature, gait, and keystroke dynamics.
Biometric identification depends on computer
algorithms to make a yes/no decision [8]. It
enhances user service by providing quick and easy
identification.
C. Knowledge Based Authentication
Knowledge based techniques are the most
extensively used authentication techniques and
include both text based and picture based
passwords. Knowledge-based authentication
(KBA) is based on “Something You Know” to
identify you For Example a Personal Identification
Number (PIN), password or pass phrase. It is an
authentication scheme in which the user is asked to
answer at least one "secret" question. KBA is often
used as a component in multifactor authentication
(MFA) and for self-service password retrieval.
Knowledge based authentication (KBA) offers
several advantages to traditional (conventional)
forms of e-authentication like passwords, PKI and
biometrics [8].
III. DESIGN
This security mechanism provides better
security to database. It solves the problem having
with traditional username and password
authentication.
3.1 System Flow
Figure 2 shows the system flow of
proposed authentication system. Flow chart
diagram shows the system flow when user try to
login the system. User enter the user name then
system will show random images include the image
submitted by user during its registration process. If
user select the correct image system send one time
password(OTP) to user on their registered cell
phone. User will enter OTP on system which define
that user is authenticated user.
Figure 2: System View
IV. IMPLEMENTATION DETAILS
4.1 Registration
Figure 3: Registration Page
In registration process the user submit
their information contain full number, E-mail Id,
Image (any random image which will further used
for verification in during login process). Image
Kamlesh Gupta.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 4) April 2016, pp.100-103
www.ijera.com 102|P a g e
submitted by user during registration process is
used as graphical password. User has to remember
image which he/she has submitted because system
uses image as password.
V. Login Process
A. Enter Username
In login process initially system will show
enter user id page. User has to enter the user id
which have registered and proceed for verification.
Figure 4: Enter username page
B. Graphical password selection
Figure 5: Graphical password selection
In this step system shows the random
images. As shown in figure 5. System shows the
random images including one image which has
submitted by user as graphic password in
registration process. If user select correct image,
system send the one time password (OTP) to users
registered number otherwise ask again to select the
image and if second time also user failed to select
correct image system block the system and send
SMS to user that unauthorized person tried to
access account. As shown in figure 6.
Figure 6: Exceed the change to login
C. One Time Password
When user passes the graphical password
selection step, system sends OTP to user. User has
to enter OTP got on cell phone via SMS. User has
to enter the OTP to system as shown in figure 7.
Figure 7: Enter OTP
VI. CONCLUSION
Database Security has become the
important aspect in information technology. There
are many authentication methods each with its
advantages and disadvantages. Using picture as
password is becoming popular but very less
research has done in this area. Proposed system is
combination of graphical password and One Time
password (OTP) which provide dual secure
mechanism for system. It is difficult to pass two
steps of checking of authenticity. Our system aims
to provide more security to system but it also has
some limitations and issues comes with drawbacks
of guessing of picture in graphical password and
OTP such as user has activated do not disturb or
some mobile network issues.
Kamlesh Gupta.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 4) April 2016, pp.100-103
www.ijera.com 103|P a g e
REFERNCES
[1]. A. S. Patrick, A. C. Long, and S. Flinn,
"HCI and Security Systems," presented at
CHI, Extended Abstracts (Workshops). Ft.
Lauderdale, Florida, USA, 2003.
[2]. A. Adams and M. A. Sasse, "Users are not
the enemy: why users compromise
computer security mechanisms and how to
take remedial measures," Communications
of the ACM, vol. 42, pp. 41-46, 1999.
[3]. K. Gilhooly, "Biometrics: Getting Back to
Business," in Computerworld, May 09,
2005.
[4]. R. Dhamija and A. Perrig, "Deja Vu: A
User Study Using Images for
Authentication," in Proceedings of 9th
USENIX Security Symposium, 2000.
[5]. M. Kotadia, "Microsoft: Write down your
passwords," in ZDNet Australia, May 23,
2005.
[6]. Token Based Authentication:
http://www.w3.org/2001/sw/Europe/event
s/foafgalway/papers/fp/token_based_authe
ntication/ [last visited on 02/05/11].
[7]. Approaches to
Authentication:http://www.e.govt.nz/plon
e/archive/services/see/see-pki-paper-
3/chapter6.html?q=archive/services/see/se
e-pki-paper-3/chapter6.html [Last Visited
on 15/05/2011].
[8]. Kailas I Patil, Jaiprakash Shimpi, A
Graphical Password using Token,
Biometric, Knowledge Based
Authentication System for Mobile
Devices,
[9]. International Journal of Innovative
Technology and Exploring Engineering 4,
March 2013.

Más contenido relacionado

La actualidad más candente

ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
prasanna9
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
CSCJournals
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
Kailas Patil
 

La actualidad más candente (20)

IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
Design and Implementation of Enhanced Single Sign on System for Education Sys...
Design and Implementation of Enhanced Single Sign on System for Education Sys...Design and Implementation of Enhanced Single Sign on System for Education Sys...
Design and Implementation of Enhanced Single Sign on System for Education Sys...
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 

Similar a Database Security Two Way Authentication Using Graphical Password

Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
dhanyashree11
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
YogeshIJTSRD
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
 

Similar a Database Security Two Way Authentication Using Graphical Password (20)

Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical password authentication using Pass faces
Graphical password authentication using Pass facesGraphical password authentication using Pass faces
Graphical password authentication using Pass faces
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 

Último

Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Último (20)

DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 

Database Security Two Way Authentication Using Graphical Password

  • 1. Kamlesh Gupta.et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 4) April 2016, pp.100-103 www.ijera.com 100|P a g e Database Security Two Way Authentication Using Graphical Password Kamlesh Gupta#1 , Arshad Malik#2 , Shamal Pawar#3 , Jijnasa Patil *4 # Dept. Of Computer Engineering,Veermata Jijabai Technological Institute Mumbai, Maharashtra (India) * Assistant Professor, Dept. Of Computer Engineering,Veermata Jijabai Technological Institute Mumbai, Maharashtra (India) ABSTRACT As data represent a key asset for today's organizations. The problem is that how to protect this data from attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data security techniques are available to protect database and computing infrastructure, many such as network security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in organization who can try to access the sensitive data. This paper proposes a two-way authentication method which fuses knowledge-based secret and personal trait information. I. INTRODUCTION Human factors are often considered the weakest link in a computer security system. Patrick, et al. [1] point out that there are three major areas where human computer interaction is important: authentication, security operations, and developing secure systems. Here we focus on the authentication problem. The vulnerabilities of this method have been well known. One of the main problems is the difficulty of remembering passwords. Studies have shown that users tend to pick short passwords or passwords that are easy to remember [2]. Unfortunately, these passwords can also be easily guessed or broken. According to recent new computer world article, the security team at a large company ran a network password cracker and within 30 seconds, they identified about 80% of the passwords [3]. On the other hand, passwords that are hard to guess or break are often hard to remember. Studies showed that since user can only remember a limited number of passwords, they tend to write them down or will use the same passwords for different accounts [4, 5]. To address the problem with tradition user name and password authentication, we will focus on alternative using two way authentication using graphical password and one time password. II. BACKGROUND 2.1 Classification of Current Authentication Methods A. Token based Authentication It is based on something that user possess. For example Smart Cards, a driver’s license, credit card, a university ID card etc. It allows the users to enter the username and password which allocate the token to the user and allow the user to access The resources without entering the username and password. Once their token has been obtained, the user can offer the token - which offers access to a specific resource for a time period - to the remote site [6]. Many token based authentication systems also use knowledge based techniques to enhance security [7]. Figure1 Classification of Authentication [8] RESEARCH ARTICLE OPEN ACCESS
  • 2. Kamlesh Gupta.et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 4) April 2016, pp.100-103 www.ijera.com 101|P a g e B. Biometric Based Authentication It is based on “Something you are”. Biometrics is the study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. It uses physiological or behavioral characteristics like fingerprint or facial scans and iris or voice recognition to identify users. A biometric scanning device takes a user's biometric data, such as an iris pattern or fingerprint scan, and converts it into digital information a computer can interpret and verify. A biometric-based authentication system may deploy one or more of the biometric technologies: voice recognition, fingerprints, face recognition, iris scan, infrared facial and hand vein thermo grams, retinal scan, hand and finger geometry, signature, gait, and keystroke dynamics. Biometric identification depends on computer algorithms to make a yes/no decision [8]. It enhances user service by providing quick and easy identification. C. Knowledge Based Authentication Knowledge based techniques are the most extensively used authentication techniques and include both text based and picture based passwords. Knowledge-based authentication (KBA) is based on “Something You Know” to identify you For Example a Personal Identification Number (PIN), password or pass phrase. It is an authentication scheme in which the user is asked to answer at least one "secret" question. KBA is often used as a component in multifactor authentication (MFA) and for self-service password retrieval. Knowledge based authentication (KBA) offers several advantages to traditional (conventional) forms of e-authentication like passwords, PKI and biometrics [8]. III. DESIGN This security mechanism provides better security to database. It solves the problem having with traditional username and password authentication. 3.1 System Flow Figure 2 shows the system flow of proposed authentication system. Flow chart diagram shows the system flow when user try to login the system. User enter the user name then system will show random images include the image submitted by user during its registration process. If user select the correct image system send one time password(OTP) to user on their registered cell phone. User will enter OTP on system which define that user is authenticated user. Figure 2: System View IV. IMPLEMENTATION DETAILS 4.1 Registration Figure 3: Registration Page In registration process the user submit their information contain full number, E-mail Id, Image (any random image which will further used for verification in during login process). Image
  • 3. Kamlesh Gupta.et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 4) April 2016, pp.100-103 www.ijera.com 102|P a g e submitted by user during registration process is used as graphical password. User has to remember image which he/she has submitted because system uses image as password. V. Login Process A. Enter Username In login process initially system will show enter user id page. User has to enter the user id which have registered and proceed for verification. Figure 4: Enter username page B. Graphical password selection Figure 5: Graphical password selection In this step system shows the random images. As shown in figure 5. System shows the random images including one image which has submitted by user as graphic password in registration process. If user select correct image, system send the one time password (OTP) to users registered number otherwise ask again to select the image and if second time also user failed to select correct image system block the system and send SMS to user that unauthorized person tried to access account. As shown in figure 6. Figure 6: Exceed the change to login C. One Time Password When user passes the graphical password selection step, system sends OTP to user. User has to enter OTP got on cell phone via SMS. User has to enter the OTP to system as shown in figure 7. Figure 7: Enter OTP VI. CONCLUSION Database Security has become the important aspect in information technology. There are many authentication methods each with its advantages and disadvantages. Using picture as password is becoming popular but very less research has done in this area. Proposed system is combination of graphical password and One Time password (OTP) which provide dual secure mechanism for system. It is difficult to pass two steps of checking of authenticity. Our system aims to provide more security to system but it also has some limitations and issues comes with drawbacks of guessing of picture in graphical password and OTP such as user has activated do not disturb or some mobile network issues.
  • 4. Kamlesh Gupta.et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 4) April 2016, pp.100-103 www.ijera.com 103|P a g e REFERNCES [1]. A. S. Patrick, A. C. Long, and S. Flinn, "HCI and Security Systems," presented at CHI, Extended Abstracts (Workshops). Ft. Lauderdale, Florida, USA, 2003. [2]. A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp. 41-46, 1999. [3]. K. Gilhooly, "Biometrics: Getting Back to Business," in Computerworld, May 09, 2005. [4]. R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000. [5]. M. Kotadia, "Microsoft: Write down your passwords," in ZDNet Australia, May 23, 2005. [6]. Token Based Authentication: http://www.w3.org/2001/sw/Europe/event s/foafgalway/papers/fp/token_based_authe ntication/ [last visited on 02/05/11]. [7]. Approaches to Authentication:http://www.e.govt.nz/plon e/archive/services/see/see-pki-paper- 3/chapter6.html?q=archive/services/see/se e-pki-paper-3/chapter6.html [Last Visited on 15/05/2011]. [8]. Kailas I Patil, Jaiprakash Shimpi, A Graphical Password using Token, Biometric, Knowledge Based Authentication System for Mobile Devices, [9]. International Journal of Innovative Technology and Exploring Engineering 4, March 2013.