In modern world, data storage is a major part of
assets. Security is only way to protect data assets from thefts.
Increase in the technology not only ameliorates the security
measures but also meliorates data thefts. To have more security,
organizations are concentrating on a place area i.e., data centers,
so that no other unauthorized person can enter into security zone.
This paper concentrates on how to restrict the access to people in
a particular period with having multiple security gateways. As
we know there are 4 factors of authentication (password, smart
card, biometrics, GPS), In this paper, we discuss another level to
add up security in narrowing down to particular time.
Published In : IJCSN Journal Volume 3, Issue 5
Date of Publication : October 2014
Pages : 377 - 380
Figures : 02
Tables : --
Publication Link : Ameliorate Security by Fifth Factor Authentication
Siva Srinivasa Rao Mothukuri : born in
Guntur, in the year 1991. Acquired
bachelor’s degree from Acharya Nagarjuna
University in 2012, also Certified in Ethical
Hacking. Worked as Assistant Professor in
R.V.R & J.C College of Engineering.
Currently working as ASE in Tata
Consultancy Services (TCS).
[1] Eldefrawy, M.H.,Alghathbar, K. ; Khan, M.K. "OTPBased
Two-Factor Authentication Using Mobile
Phones", "Information Technology: New Generations
(ITNG), 2011 Eighth International Conference",
IEEE
[2] Jing-Chiou Liou,Bhashyam, S., "A feasible and cost
effective two-factor authentication for online
transactions", "Software Engineering and Data
Mining (SEDM), 2010 2nd International
Conference", IEEE
[3] Xinyi Huang, Yang Xiang ; Chonka, A. ; Jianying
Zhou ; Deng, R.H; "A Generic Framework for Three-
Factor Authentication: Preserving Security and
Privacy in Distributed Systems", "Parallel and
Distributed Systems, IEEE Transactions on
(Volume:22 , Issue: 8 ) Biometrics Compendium,
IEEE", IEEE
[4] Mathew, H.M. Raj, S.B.E. ; Gundapu, P.S.J. ;
Angeline, S.J.F; "An improved three-factor
authentication scheme using smart card with
biometric privacy protection, "Electronics Computer
Technology (ICECT)", 2011 3rd International
Conference on (Volume:3 )", IEEE
[5] Sanghoon Jeon; Four-factor verification methodology
for entity authentication assurance, "Information
Science and Applications (ICISA), 2011 International
Conference", IEEE