Downloads: 120 | Views: 288
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.3 / 10
Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication ? Research Paper
Harvinder Singh, Amandeep Kaur
Abstract: In case, somebody once see a user entering the graphical password can easily remember or guess the pattern and can take access to the device. Our major goal is to overcome this security issue and to use the password on the cloud platforms for the administrator panels for various cloud applications. Using this password scheme, the touch screen friendly secure administration interfaces can be developed to give the administrators an easy access to the administration panel. In this research, a multi-level password authentication scheme has been proposed for the administrator panels, where the administrators would be prompted to enter the first-level password at first and second-level password can be used to access more critical administration areas in order to protect the power user accounts from hacking attempts. A user when signup creates and stores a pattern by joining the number points or by selecting the images to create a password, the password is converted into a hash which is further sent to the server for the authentication purposes. The server returns the decision logic which is responsible to accept or deny the login request. To gain the access to the device, the user has to remember the graphical passwords and need to enter the same sequence every time drawing a pattern. The proposed scheme has been evaluated as effective, robust, ease of access and wide adaptability of the scheme for the various smart phone platforms. The proposed scheme has been evaluated under various situations. Both of the graphical password schemes have been evaluated individually with various password combinations. The new multi-level graphical password scheme can be considered as a secure scheme for cloud platforms.
Keywords: Cloud Storage, Access Control Model, Attribute based signatures, Multi-tier authentication, Graphical authentication
Edition: Volume 4 Issue 11, November 2015
Pages: 231 - 236
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 109
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1048 - 1052Authentication by Equalizing the Graphical Bars
Salim Istyaq
Downloads: 111
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2418 - 2422A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes
Dhanashree Chaudhari
Downloads: 111
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1940 - 1943Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment
Mojtaba Mohamamdi, Keshav Kishore
Downloads: 112
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2024 - 2027Survey Paper on User Anonymous Authentication Scheme for Decentralized Access Control in Clouds
Afsha Pathan, M. D. Ingle
Downloads: 119
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2675 - 2680Multiparty Authorization for Data Shares in Online Social Networks
S. Ramijaanaki