Three Factor Authentication Novel Framework through Improve System Privacy and Data Security

Authors

  • Er. Vishal Chauhan  School of Information Technology, Artificial Intelligence, and Cyber Security, Rashtriya Raksha University, Gandhinagar, Gujarat, India
  • Dr. Chandresh Parekh  School of Information Technology, Artificial Intelligence, and Cyber Security, Rashtriya Raksha University, Gandhinagar, Gujarat, India
  • Prof. Vivek Joshi  School of Information Technology, Artificial Intelligence, and Cyber Security, Rashtriya Raksha University, Gandhinagar, Gujarat, India

DOI:

https://doi.org//10.32628/IJSRSET218324

Keywords:

Cyber Security, Authentication, Three-Factor Authentication, Access Control, Web Application, Two Factor Authentication, Single Factor Authentication, Digital Security, Authorization, Privacy

Abstract

Authentication, Authorization, security and confidential information are number of foremost topics part in the Digital cyber - security Area. There are multiple solutions available in this virtualize cyber world that are presented to user’s strength as per digital security. Username and password base are common factor authentication methods. The growing-up popularity with compliance of second factorized methods those driven by the improvement of privacy and security as per the requirement during this digitalization of technological trend. The recognition and success of digital security various measures are big deal to obsessed with simple convenience. Its need more and more implementation for the user privacy, data confidentiality and network security’s system. mainly focus on this research Article into dealing with and analysing the implications of security part of 3FA proposal model for additional security in way of systematic manner to improvements of digital security in web-based Application. This paper will be presenting as web-based Application. so, we can create potentially ensure systems are authorized with authentication of user's assurance without loss of convenience between user-system data communication in network.

References

  1. Blackwell, A., Anderson, R., Yan, J., Grant, A., “Password memorability and security: Empirical results.” IEEE - Institute of Electrical and Electronics Engineers on privacy and security,2007, vol. 2 (no. 5), p.25-31.
  2. Gawade, L.S., Gurav, S.M., Rane, P.K., Khochare, N.R., “Graphical password authentication: Cloud securing scheme.”, January 2014, In Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on IEEE - Institute of Electrical and Electronics Engineers (p. 479-483).
  3. Oberoi, R.K., Kumari, S., “Defense against Shoulder Surfing Attack for Recognition Based Graphical Password.” IJECS - International Journal of Engineering and Computer Science, 2014 vol. 3(no. 07).
  4. Pankanti, S., Jain, A.K., Prabhakar, S., “Biometric recognition: Security and privacy concerns.” IEEE - Institute of Electrical and Electronics Engineers privacy and security, 2003 vol. 99(no. 2), (p.33- 42).
  5. Gaikwad, A.N., Soares, J., “Fingerprint and iris biometric controlled smart banking machine embedded with GSM technology for OTP” IEEE - Institute of Electrical and Electronics Engineers Xplore conference International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016
  6. Dodis, Y., Reyzin, L. and Smith, A., “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data” Advances in Cryptology Springer Link - Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2004, (p 523-540)
  7. Van Oorschot, P.C., Bonneau J, Herley, Stajano, F., “The quest to replace passwords: A framework for comparative evaluation of web authentication schemes.” IEEE - Institute of Electrical and Electronics Engineers Symposium in Privacy and Security, May-2012 (p. 553-567).
  8. xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou., “A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy” in Distributed Systems. IEEE – Institute of Electrical and Electronics Engineers, 2010.
  9. Rajesh Karman Megalingam, Binitha Ann Scaria “Enhanced E-commerce Application Security using Three-Factor Authentication”, Second International Conference on intelligent Computing and Control Systems – ICICCS, 2018
  10. C. Lakshmi Devasena “Three-Factor Authentication for Fortified Login to Ensure Privacy Preservation and Improved Security” International Journal of Applied Engineering Research ISSN 0973-4562 Vol.13, (p. 7576-7579) Nov.- 2018
  11. Aspen Olmsted, William Kennedy “Three Factor Authentication” 12th International Conference for Internet Technology and Secured Transaction – ICITST, 2017.
  12. Edward F. Gehringer “Choosing passwords: Security and Human factors” IEEE - Institute of Electrical and Electronics Engineers, (ISTAS’02) - international symposium on Technology and Society, ISBN 0-7803-7284-0, (p. 369 – 373), 2002.
  13. Alireza Pirayesh Sabzevar, Angelos Stavrou, “Universal Multi-Factor Authentication Using Graphical Passwords”, Proceedings of the IEEE - International Conference on Signal Image Technology and Internet Based Systems, (p. 625-632), 2008.
  14. Manav Singhal and Shashikala Tapaswi “Software Tokens Based Two Factor Authentication Scheme” International Journal of Information and Electronics Engineering, Vol.2(No. 3), (p. 383 – 386), May - 2012.
  15. Sharifah Mumtazah Syed Ahmad, et al “Technical Issues and Challenges of Biometric Applications as access control tools of Information Security” International Journal of Innovative Computing, Information and Control Vol.8(No. 11), (p. 7983 – 7999), Nov. - 2012.

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Er. Vishal Chauhan, Dr. Chandresh Parekh, Prof. Vivek Joshi, " Three Factor Authentication Novel Framework through Improve System Privacy and Data Security, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 3, pp.183-190, May-June-2021. Available at doi : https://doi.org/10.32628/IJSRSET218324