Simple Authentication Technique for Session Management Using Odd and Even Pair of Random Text and Color Password in Cloud Computing

Authors

  • P. Kalimuthu Department of Computer Science and Engineering, Sardar Raja College of Engineering, Tamil Nadu, India
  • A. Justin Diraviam Department of Computer Science and Engineering, Sardar Raja College of Engineering, Tamil Nadu, India

DOI:

https://doi.org/10.51983/ajcst-2012.1.1.1691

Keywords:

Authentication, session passwords, shoulder surfing

Abstract

While some legal challenges in cyberspace have started to become clearer, the use of cloud computing and hosted applications adds a new dimension of legal risk. Compliance, privacy, and security problems are compounded by the use of remote, distributed services operated by third parties. Businesses employing these new technologies must look a new at their online risk, and learn how to assess and manage it. Authentication is the first line of defense against compromising confidentiality and integrity. Though traditional login/password based schemes are easy to implement, they have been subjected to several attacks. Textual-based password authentication scheme tends to be more vulnerable to attacks such as shoulder surfing and hidden camera. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text-based password schemes. Because simply adopting graphical password authentication also has some drawbacks, schemes using graphic and text have been developed. In this paper, we propose a hybrid password authentication scheme based on equal number of Random color and text. It uses color and text on the grid as the origin passwords and allows users to login with text passwords via traditional input devices. The method provides strong resistant to hidden-camera and shoulder-surfing. Moreover, the scheme has high scalability and flexibility to enhance the authentication process security. The analysis of the security level of this approach is also discussed.

References

R. Dhamija, and A. Perrig. “Déjà Vu: A User Study Using Images for Authentication”. In 9th USENIX Security Symposium, 2000.

Real User Corporation: Passfaces. www.passfaces.com

Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin., “The design and analysis of graphical passwords” in Proceedings of USENIX Security Symposium, August 1999.

F. Syukri, E. Okamoto, and M. Mambo, “A User Identification System Using Signature Written with Mouse,” in Third Australasian Conference on Information Security and Privacy (ACISP): Springer-

Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.

G. E. Blonder, “Graphical passwords,” in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.

Passlogix, site http://www.passlogix.com.

Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin, “A New Graphical Password Scheme Resistant to Shoulder-Surfing

S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon, “Design and longitudinal evaluation of a graphical password system”. International J. of Human-Computer Studies 63 (2005) 102-127.

W. Jansen, “Authenticating Mobile Device User through Image Selection,” in Data Security, 2004.

W. Jansen, “Authenticating Users on Handheld Devices “in Proceedings of Canadian Information Technology Security Symposium, 2003.

Downloads

Published

05-05-2012

How to Cite

Kalimuthu, P., & Justin Diraviam, A. (2012). Simple Authentication Technique for Session Management Using Odd and Even Pair of Random Text and Color Password in Cloud Computing. Asian Journal of Computer Science and Technology, 1(1), 130–134. https://doi.org/10.51983/ajcst-2012.1.1.1691