Qualitative Analysis of Recognition-based Graphical Password Authentication Schemes for Accessing the Cloud

Author(s):  
K Gangadhara Rao ◽  
Vijayakumari Rodda ◽  
B Basaveswara Rao

<p>Cloud computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud application is real and perceived lack of security. There are many security mechanisms exercised to utilize cloud services. Amongst them the prominent and primitive security mechanism is the Authentication System. Traditional text based passwords are susceptible to threats. Tough passwords are hard to recall and easily recalled passwords are simple and predictable. Graphical passwords are introduced as the better alternative. Two types of graphical passwords are there – recall based and recognition based. This research reviews several Recognition-Based Graphical Password methods and analyses their security based on the estimation criteria. Moreover, the research defines a metric called a 14-point scale that would make it possible for the qualitative analysis of the graphical passwords schemes. </p>

2015 ◽  
Vol 72 (5) ◽  
Author(s):  
Touraj Khodadadi ◽  
Mojtaba Alizadeh ◽  
Somayyeh Gholizadeh ◽  
Mazdak Zamani ◽  
Mahdi Darvishi

One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall and if the passwords are too simple and predictable, then there is the danger of being susceptible to threats. In order to overcome the problems with authentication, an alternative and new approach has been introduced utilizing images for passwords. The idea gains support from the knowledge that the human’s brain is highly capable of remembering many detailed images, however remembering texts are more difficult. Users who utilize the graphic authentication carry out certain functions on the images such as to click, drag, and movement of the mouse and so on. This research reviews several common Recognition-Based graphical password methods and analyzes their security based on the estimation criteria. Moreover, the research defines a metric that would make it possible for the analysis of the security level of the graphical passwords that are Recognition-Based. Finally, a table comparing the limits of each method based on the security level is presented. 


2018 ◽  
Vol 7 (4.10) ◽  
pp. 470
Author(s):  
P. L.P.Ramyasri ◽  
D. Malathi ◽  
J. D. Dorathi Jayaseeli ◽  
K. Senthilkumar

The text-based password has been the most common practice from ancient days till present. Text based pass-words are also known for various threats, and it is prone to attacks like guessing attacks, dictionary attacks, social engineering attacks, brute force attacks, etc. The next immediate concept following the text based password is the graphical password schemes to improve password security and usability. In present days graphical passwords are being implemented more commonly. This approach is different from the traditional alpha numeric as it deals with images. In this paper a survey study is done to analyse various techniques used for authentication and also some of the methods for graphical authentication techniques like Pass Matrix, Cued Clicked points(CPP), CAPTCHA, Image distortion with text association, Doodle scheme, Standard recognition-based scheme, Stegno pin authentication method. Based on the existing methods, the future research can be done in order to improve security for graphical authentication.  


2015 ◽  
Vol 4 (1) ◽  
pp. 33-38 ◽  
Author(s):  
Syeatha Merlin Thampy ◽  
Alphonsa Johny

2016 ◽  
Vol 18 (04) ◽  
pp. 54-58
Author(s):  
Tivkaa, M.L. ◽  
Choji, D. N. ◽  
Agaji, I. ◽  
Atsa‟am, D.

Author(s):  
Djamel Benmerzoug

The challenges that Cloud computing poses to business processes integration, emphasize the need for addressing two major issues: (i) which integration approach should be used allowing an adequate description of interaction aspects of the composed software components ? (ii) how are these interaction descriptions stored and shared to allow other software artifacts to (re)use them ? To address these issues, in this paper the authors propose an Agent Interaction Protocols (AiP)-based approach for reusing and aggregating existing Cloud services to create a new desired business application. The proposed approach facilitates rapid development and provisioning of composite Cloud services by specifying what to compose as an AiP. Furthermore, the authors develop an agent-based architecture that supports flexible scaling of business processes in a virtualized Cloud computing environment. The main goal of the proposed architecture is to address and tackle interoperability challenges at the Cloud application level. It solves the interoperability issues between heterogeneous Cloud services environments by offering a harmonized API. Also, it enables the deployment of applications at public, private or hybrid multi-Cloud environments.


i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 237-257
Author(s):  
Christina Katsini ◽  
Nikolaos Avouris ◽  
Christos Fidas

AbstractThere is evidence that the visual behavior of users when creating graphical passwords affects the password strength. Adopting a cognitive style perspective in the interpretation of the results of recent studies revealed that users, depending on their cognitive style, follow different visual exploration paths when creating graphical passwords which affected the password strength. To take advantage of the inherent abilities of people, we proposed CogniPGA, a cued-recall graphical authentication scheme where a cognition-based intervention using gaze data is applied. This paper presents the longitudinal evaluation of the proposed scheme in terms of security, memorability, and usability from a cognitive style perspective. Results strengthen the assumptions that understanding and using the inherent cognitive characteristics of users could enable the design of user-first authentication schemes, where no compromises need to be made on security for benefiting usability or the other way around.


2019 ◽  
Vol 20 (1) ◽  
pp. 101-112 ◽  
Author(s):  
Pankhuri . ◽  
Akash Sinha ◽  
Gulshan Shrivastava ◽  
Prabhat Kumar

User authentication is an indispensable part of a secure system. The traditional authentication methods have been proved to be vulnerable to different types of security attacks. Artificial intelligence is being applied to crack textual passwords and even CAPTCHAs are being dismantled within few attempts. The use of graphical password as an alternate to the textual passwords for user authentication can be an efficient strategy. However, they have been proved to be susceptible to shoulder surfing like attacks. Advanced authentication systems such as biometrics are secure but require additional infrastructure for efficient implementation. This paper proposes a novel pattern-based multi-factor authentication scheme that uses a combination of text and images resulting for identifying the legitimate users. The proposed system has been mathematically analyzed and has been found to provide much larger password space as compared to simple text based passwords. This renders the proposed system secure against brute force and other dictionary based attacks. Moreover, the use of text along with the images also mitigates the risk of shoulder surfing.


Sign in / Sign up

Export Citation Format

Share Document