PROJECT TITLE :

A Secure and Practical Authentication Scheme Using Personal Devices - 2017

ABSTRACT:

Authentication plays a critical role in securing any on-line banking system, and several banks and varied services have long relied on username/password combos to verify users. Memorizing usernames and passwords for a heap of accounts becomes a cumbersome and inefficient task. Furthermore, legacy authentication methods have failed over and over, and they're not immune against a wide variety of attacks that may be launched against users, networks, or authentication servers. Over the years, information breach reports emphasize that attackers have created various high-tech techniques to steal users' credentials, which will cause a serious threat. In this paper, we tend to propose an efficient and sensible user authentication scheme using personal devices that utilize different cryptographic primitives, like encryption, digital signature, and hashing. The technique edges from the widespread usage of ubiquitous computing and varied intelligent moveable and wearable devices that can enable users to execute a secure authentication protocol. Our proposed theme will not require an authentication server to maintain static username and password tables for identifying and verifying the legitimacy of the login users. It not solely is secure against password-related attacks, however conjointly will resist replay attacks, shoulder-surfing attacks, phishing attacks, and data breach incidents.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : Fast and Secure Distributed Nonnegative Matrix Factorization ABSTRACT: The nonnegative matrix factorization (NMF) technique has been utilized effectively in a number of different data mining activities. Because
PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : Secure Cloud Data Deduplication with Efficient Re-encryption ABSTRACT: The data deduplication technique has seen widespread adoption among commercial cloud storage providers, which is both important and necessary
PROJECT TITLE : Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus ABSTRACT: In the fields of cryptography and algorithmic number theory, modular inversion is regarded as one of the operations that
PROJECT TITLE : Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage ABSTRACT: Cloud storage has become a primary industry in remote data management services, but it also attracts security concerns.

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry