Incorporated Approach for Multiserver Inaccessible User Authentication
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015

Incorporated Approach for Multiserver Inaccessible User Authentication

Madhuri R. Shirkande

Multi server remote client verification assumes essential part in distinguishing the aggressors of web administrations. In existing methods we utilized single server for identify remote user & security. In Multiserver remote user authentication people obtain their services by using mobile devices. Which require minimum computation and communication energy. Important goal of system is enhance security using ECC (Eliptic curve cryptography), OTP (one time password), And ATM Matrix card validation. Which withstand with offline Dictionary attacks, MIME attacks, malicious server attacks. Praposed scheme enhance security with mutual authentication between servers with minimum computation and communication energy. Multi server strategy is utilized for confirmation & security. The one server is used to give administration to the client & other server is utilized for enrolling the clients as a part of multi client server procedure. On the off chance that client has enrolled to the registration server than just he/she can get to the administration server. User can login in on administration client in the wake of getting the user ID, secret key in their database. With most reduced sum count overhead & littler keys ecliptic bend cryptography gives better security. So design such type of protocol which reduces the cost and computatation speed with enhanced security is main goal of system.

Keywords: Multiserver, Authentication, ECC, OTP, Matrix Validation

Edition: Volume 4 Issue 9, September 2015

Pages: 476 - 479

Share this Article

How to Cite this Article?

Madhuri R. Shirkande, "Incorporated Approach for Multiserver Inaccessible User Authentication", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158082, Volume 4 Issue 9, September 2015, 476 - 479

45 PDF Views | 45 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Multiserver'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 476 - 479

Incorporated Approach for Multiserver Inaccessible User Authentication

Madhuri R. Shirkande

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 350 - 355

Survey on a Profitable Service in Cloud Computing

Shaikh Md. Arshad

Share this Article

Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2302 - 2305

Authentication Using Text and Graphical Password

Mayur H Patel, Nimit S Modi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1312 - 1317

A Review on Auditing in Cloud

MS Tanuja Sali

Share this Article

Similar Articles with Keyword 'ECC'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 5 - 9

A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment

Yogeswararao Gairaboina, Y. Siva Prasad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2571 - 2577

Large-Scale Cost-Effective Secured Content Distribution in the Cities Using Vehicular Networks

Vinay M Naganur, Anand R

Share this Article

Similar Articles with Keyword 'OTP'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1167 - 1172

Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space

Taranpreet Kaur, Harmandeep Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 2199 - 2202

A Secure OTP Algorithm using Smartphone Application ? Proposed Approach

Sonal N. Pannase, P. R. Pardhi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1433 - 1438

Modified Sequential Pattern Mining Using Direct Bit Position Method

Dr. K. Subramanian, E. Elakkiya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 173 - 177

Enabling Indirect Mutual Trust and Secure Login Mechanism for Cloud Computing Storage Systems

Yasha Gawande, Shilpa Gite

Share this Article
Top