Call for Paper

CAE solicits original research papers for the October 2021 Edition. Last date of manuscript submission is September 30, 2021.

Read More

Enhancing Authentication Schemes for Multi-Level Graphical Password in Cloud Environment

Ramandeep Kaur, Amanpreet Kaur. Published in Information Sciences.

Communications on Applied Electronics
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Ramandeep Kaur, Amanpreet Kaur
10.5120/cae2016652340

Ramandeep Kaur and Amanpreet Kaur. Enhancing Authentication Schemes for Multi-Level Graphical Password in Cloud Environment. Communications on Applied Electronics 5(8):12-18, August 2016. BibTeX

@article{10.5120/cae2016652340,
	author = {Ramandeep Kaur and Amanpreet Kaur},
	title = {Enhancing Authentication Schemes for Multi-Level Graphical Password in Cloud Environment},
	journal = {Communications on Applied Electronics},
	issue_date = {August 2016},
	volume = {5},
	number = {8},
	month = {Aug},
	year = {2016},
	issn = {2394-4714},
	pages = {12-18},
	numpages = {7},
	url = {http://www.caeaccess.org/archives/volume5/number8/638-2016652340},
	doi = {10.5120/cae2016652340},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The graphical password patterns are in the rising trend in world with the abundance of the touch screen devices. A variety of touch screen devices are present for the users such as mobile phones, tables, touch-enabled laptops, touch-enabled notebooks, etc. The graphical password has evolved with the invention of the touch-screen devices. The popular graphical schemes known as Pass-Go Pattern, Pass-point pattern and other similar schemes has been studied for the development of the new graphical password scheme. The existing models based upon pass-go and pass-point model stays as the basic model for our research for the development of the effective and secure graphical password scheme. It becomes difficult to input the alphanumeric passwords on the touch screens. The alphanumeric input lacks the high order accuracy as well as requires more focus to input the password. Most of the popular schemes have used the 3x3, 3x4 or 4x3 point-grid method for prompting the patterns to the users. The clue-point method is another popular method to display the graphical grid for the password input. In the proposed graphical model, graphical authentication model based upon the images has been aimed at to resolve the issues persisting in the existing models. In this model, the shuffling pattern based method has been used for the mitigation of the shoulder surfing attacks. The shuffling pattern scheme changes the primary display for password input every-time, which also restructure the input grid to overcome the threat caused by the shoulder surfing attacks.The proposed model has been designed to offer the robust graphical password scheme with the face images randomly collected by the users. The random point module for the visualization of the password input module plays the key role in the proposed graphical password scheme. The proposed model is a circular point model where the points are placed on the circle and the images are drawn on the given points. The user has to input the graphical pattern by joining the images with each other in the certain sequence. The proposed model requires less focus and highly accurate and easy to use. The experimental results have been evaluated in the factors associated with the study of the usability, memorabiltiy and difficulty in password creation. The proposed model has been compared against the existing models on the basis of the latter factors, where the proposed model has outperformed the existing models.

References

  1. Bashier, H. K., Hoe, L. S., & Han, P. Y. “Graphical Password: Pass-Images Edge Detection”, In Signal Processing and it’s Applications (CSPA), IEEE 9th International Colloquium , Pp. 111-116 , 2013.
  2. Dinesha, H. A., And V. K. Agrawal. "Multi-Level Authentication Technique For Accessing Cloud Services." Computing, Communication And Applications (ICCCA), 2012 International Conference On.IEEE, Pp 1-4, 2012.
  3. Hussain, Abdulameer. "Enhanced Authentication Mechanism Using Multilevel Security Model." Int. Arab J. E-Technol. V.1.2 , Pp 49-57,2009.
  4. Ku, Wei-Chi, Dum-Min Liao, Chia-Ju Chang, And Pei-Jia Qiu. "An Enhanced Capture Attacks Resistant Text-Based Graphical Password Scheme." In Communications In China (ICCC), IEEE/CIC International Conference On, Pp. 204-208, 2014.
  5. Kaur, R., & Kaur, A. (2015). Multi-Factor Graphical Password for Cloud Interface Authentication Security. International Journal of Computer Applications, 125(7).
  6. Renaud, K., Mayer, P., Volkamer, M., & Maguire, J. “Are Graphical Authentication Mechanisms As Strong As Passwords” In Computer Science And Information Systems (Fedcsis), Federated Conference On Pp. 837-844, 2013.
  7. Revar, A. G., & Bhavsar, M. D. “Securing User Authentication Using Single Sign-On In Cloud Computing” In Engineering (Nuicone), Nirma University International Conference On Pp. 1-4, 2011.
  8. Shraddham. Gurav, “Graphical Password Authentication”, ICESSPCT, Vol. 1, Pp. 479483,2014.
  9. Singh, M., & Singh, S. “Design And Implementation Of Multi-Tier Authentication Scheme In Cloud” IJCSI International Journal Of Computer Science Issues, 9(5), Pp. 87-90.
  10. Singh, N., & Bomanwar, N. (2015, October). Improved Authentication scheme using password enabled Persuasive Cued Click Points. In Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on (pp. 1394-1398). IEEE.
  11. Tao, Hai, And Carlisle Adams. "Pass-Go: A Proposal To Improve The Usability Of Graphical Passwords." IJ Network Security 7, Pp.273-292.2 ,2008.
  12. Tanvi Naik, Sheetal Koul, “Multi-Dimensional And Multi-Level Authentication Techniques”, IJCA ,Vol. 75, Issue 12, Pp.17-22, 2013.
  13. Yi-Lun Chen, Wei-Chi Ku, Yu-Chang Yeh, Dun-Min Liao, “A Simple Text-Based Shoulder Surfing Resistant Graphical Password”, ISNE, Vol. 1, Pp. 161-164,2013.
  14. Wiedenbeck, Susan, Jim Waters, Jean-Camille Birget, Alex Brodskiy, and Nasir Memon. "PassPoints: Design and longitudinal evaluation of a graphical password system." International Journal of Human-Computer Studies 63, no. 1 (2005): 102-127.
  15. Chiang, Hsin-Yi, and Sonia Chiasson. "Improving user authentication on mobile devices: A touchscreen graphical password." In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, pp. 251-260. ACM, 2013.

Keywords

Graphical Authentication, Cue-points, pattern lock, pattern password, cloud authentication, mobile authentication.