Category-Based Graphical User Authentication (CGUA) Scheme for Web Application

Author(s):  
Mohd Zamri Osman ◽  
Norafida Ithnin
Author(s):  
Shatha J. Mohammed ◽  
Sadiq A. Mehdi

<span>Text password has long been a dominant approach to user authentication used by a huge quantity of Internet services. Web applications are now widely used for the implementation of a range of significant services. The securing of such applications has thus become a significant process. Currently the frequent use of passwords and the need for them make them more vulnerable to theft or guesswork. In the proposed research, the researcher designed an algorithm that has the ability to perform registration or to access web applications safely. The researcher designed an algorithm in the proposed research, which has the ability to securely perform registration or access web applications. The proposed idea based on the notion of Zero-knowledge proof. A complex generation of random number initiated by proposed novel 6D-Hyper chaotic system. The bottom line is that both parties (web application, user), have a secret number. These two numbers used to do the process of registration without requiring a password. Results from the research showed the importance of the proposed method by which the keys were managed and distributed in a safe and effective way.</span>


Author(s):  
Shivani V. Dhoke

In this manuscript, “Pocket Certificates'' - a conventional document organizing with the capability of securely storing those documents is presented. Documents are something that provides information or can be a certification for someone or also can be a legal report. The theft of such important documents/certificates can interfere/hamper an individual or organization from performing their work efficiently and can also lead to loss of possessions. The solution is the use of a Double Encryption system based on an amalgamation of RSA, AES and MD5 standards. Use of enhanced security can be thought of as a compromise in reliability and smooth function of a system but to the process, there are some constraints to be set so that the Encryption/Decryption process does not hamper the usability. This paper takes account of such attributes and keeps a balance between all of them. There is also the use of other Hashing techniques like bycrypt securely storing user login details and use of passport middleware for unique user authentication requirements at each application stage. The paper consists of an overall web application for the secure archive to documents or important data.


2020 ◽  
Vol 6 (2) ◽  
pp. 74
Author(s):  
Marsha Chikita Intania Putri ◽  
Parman Sukarno ◽  
Aulia Arif Wardana

Authentication is a method for securing an account by verifying the user identity by inputting email with a password. Two factor authentications is an authentication system that combines the first-factor authentication with the second factor. General two factor authentication by entering an email or username with a password are similar. However, two factor authentication requires additional information that must be inputted by the user. Additional information can be in the form of tokens or one-time passwords (OTP). Two factor authentications generally still uses third-party services to generate token or OTP still have vulnerable because can attacked from tokens steal through MITM and found that the generated tokens with the same value. Therefore, we propose a two-factor authentication framework based on ethereum blockchain with dApp as token generation system. Firstly, outcome from the analysis of the system, next succeeded in creating a two-factor authentication system without using third-parties. Second, token system generate up to 3164 different tokens  in one second and has been collisions tested. Third, security method to protect token from MITM attack. The attacker unable to get access caused all the checking are done by dApp user authentication.


2021 ◽  
Vol 6 (2) ◽  
pp. 210
Author(s):  
Rudi Hermawan

<p><em>In recent years cases of cyber attacks that lead to website security have increased. The most widely used website hacking threat is sql injection. By using the sqlmap tool that runs on the Kalilinux  operating system, attackers can easily take over very important user authentication data with their passwords. Attackers only use a special SQL query script using the python programming language will force the web server to output database information, tables, columns and data contents. This sql injection technique is not difficult, knowing how sql injection works is expected to be useful for web admins and web application developers to be able to secure user access from attackers. This attack simulation uses a virtual machine, by creating two virtual computers that are scripted as the attacker and the target server. By testing through this simulation, we can find out how the attack process and the consequences of attacks carried out by attackers.</em></p>


Database ◽  
2020 ◽  
Vol 2020 ◽  
Author(s):  
Bohdan B Khomtchouk ◽  
Christopher S Nelson ◽  
Kasra A Vand ◽  
Salvator Palmisano ◽  
Robert L Grossman

Abstract Cardiovascular disease (CVD) is the leading cause of death worldwide for all genders and across most racial and ethnic groups. However, different races and ethnicities exhibit different rates of CVD and its related cardiorenal and metabolic comorbidities, suggesting differences in genetic predisposition and risk of onset, as well as socioeconomic and lifestyle factors (diet, exercise, etc.) that act upon an individual’s unique underlying genetic background. Here, we present HeartBioPortal2.0, a major update to HeartBioPortal, the world’s largest CVD genetics data precision medicine platform for harmonized CVD-relevant genetic variants, which now enables search and analysis of human genetic information related to heart disease across ethnically diverse populations and cardiovascular/renal/metabolic quantitative traits pertinent to CVD pathophysiology. HeartBioPortal2.0 is structured as a cloud-based computing platform and knowledge portal that consolidates a multitude of CVD-relevant genomic data modalities into a single powerful query and browsing interface between data and user via a user-friendly web application publicly available to the scientific research community. Since its initial release, HeartBioPortal2.0 has added new cardiovascular/renal/metabolic disease–relevant gene expression data as well as genetic association data from numerous large-scale genome-wide association study consortiums such as CARDIoGRAMplusC4D, TOPMed, FinnGen, AFGen, MESA, MEGASTROKE, UK Biobank, CHARGE, Biobank Japan and MyCode, among other studies. In addition, HeartBioPortal2.0 now includes support for quantitative traits and ethnically diverse populations, allowing users to investigate the shared genetic architecture of any gene or its variants across the continuous cardiometabolic spectrum from health (e.g. blood pressure traits) to disease (e.g. hypertension), facilitating the understanding of CVD trait genetics that inform health-to-disease transitions and endophenotypes. Custom visualizations in the new and improved user interface, including performance enhancements and new security features such as user authentication, collectively re-imagine HeartBioPortal’s user experience and provide a data commons that co-locates data, storage and computing infrastructure in the context of studying the genetic basis behind the leading cause of global mortality. Database URL: https://www.heartbioportal.com/


2012 ◽  
Vol 2 (2) ◽  
pp. 129-130
Author(s):  
A. Sai Kumar ◽  
◽  
P. Subhadra P. Subhadra
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document