Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Ameliorate Security by Fifth Factor Authentication  
  Authors : Siva Srinivasa Rao Mothukuri
  Cite as:

 

In modern world, data storage is a major part of assets. Security is only way to protect data assets from thefts. Increase in the technology not only ameliorates the security measures but also meliorates data thefts. To have more security, organizations are concentrating on a place area i.e., data centers, so that no other unauthorized person can enter into security zone. This paper concentrates on how to restrict the access to people in a particular period with having multiple security gateways. As we know there are 4 factors of authentication (password, smart card, biometrics, GPS), In this paper, we discuss another level to add up security in narrowing down to particular time.

 

Published In : IJCSN Journal Volume 3, Issue 5

Date of Publication : October 2014

Pages : 377 - 380

Figures : 02

Tables : --

Publication Link : Ameliorate Security by Fifth Factor Authentication

 

 

 

Siva Srinivasa Rao Mothukuri : born in Guntur, in the year 1991. Acquired bachelor’s degree from Acharya Nagarjuna University in 2012, also Certified in Ethical Hacking. Worked as Assistant Professor in R.V.R & J.C College of Engineering. Currently working as ASE in Tata Consultancy Services (TCS).

 

 

 

 

 

 

 

Biometrics

GPS

Attacks

Smart Cards

RFID

We can’t regret just simply loosing data due to lack of security. Having a single level of authentication is not that simple to protect confidential data. To have furthermore security, this paper amplifies the levels of security by adding one more level i.e. fifth level.

 

 

 

 

 

 

 

 

 

[1] Eldefrawy, M.H.,Alghathbar, K. ; Khan, M.K. "OTPBased Two-Factor Authentication Using Mobile Phones", "Information Technology: New Generations (ITNG), 2011 Eighth International Conference", IEEE

[2] Jing-Chiou Liou,Bhashyam, S., "A feasible and cost effective two-factor authentication for online transactions", "Software Engineering and Data Mining (SEDM), 2010 2nd International Conference", IEEE

[3] Xinyi Huang, Yang Xiang ; Chonka, A. ; Jianying Zhou ; Deng, R.H; "A Generic Framework for Three- Factor Authentication: Preserving Security and Privacy in Distributed Systems", "Parallel and Distributed Systems, IEEE Transactions on (Volume:22 , Issue: 8 ) Biometrics Compendium, IEEE", IEEE

[4] Mathew, H.M. Raj, S.B.E. ; Gundapu, P.S.J. ; Angeline, S.J.F; "An improved three-factor authentication scheme using smart card with biometric privacy protection, "Electronics Computer Technology (ICECT)", 2011 3rd International Conference on (Volume:3 )", IEEE

[5] Sanghoon Jeon; Four-factor verification methodology for entity authentication assurance, "Information Science and Applications (ICISA), 2011 International Conference", IEEE