Downloads: 119 | Views: 303
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 11, November 2016 | Popularity: 6.4 / 10
E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack
Gore Kranti K, Jarali Vilas M
Abstract: This paper presents a new framework for email clustering with oPass security. User mostly used text password for simplicity. Most users has multiple accounts of Gmail, yahoo and other websites they are separately login on each account and hence end up spending a more time in accessing them. It becomes a difficult task to remember all email ids and passwords for all their accounts. This paper presents a simple and single technique of which we club all the users accounts into one account. It presents a framework for cluster or group of different email id account. The user authentication protocol (OPass) used to protect user identity. OPass only requires each participating website possesses a unique mobile number, and registration and recovery process done by telecommunication service provider (TSP). TSP phases use for the creation of one-time password. Now a days text password easily hacked and hacker access all information all other accounts of user. OPass is efficient and inexpensive compared with the other web authentication mechanisms. Therefore OTP mechanism that has implement security using private key infrastructure is used to prevent accessing sensitive information data integrity and problem due to phishing attack and key-loggers. User use SMS (short message service) for receive email notification, one time password send by the server. This system help to preventing attack mainly phishing attack, key-loggers, and password reuse attack.
Keywords: Clustering, Email, OPass, password reuse attack, password stealing attack, phishing attack
Edition: Volume 5 Issue 11, November 2016
Pages: 1861 - 1866
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Masters Thesis, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1502 - 1505Model of Decision Tree for Email Classification
Nallamothu Naveen Kumar
Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 1059 - 1065Unlocking the Coverts: How 'Machine Learning' is Revolutionizing Covert Communication
Veena N D, Anitha Devi M D
Downloads: 100
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Downloads: 103
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1368 - 1371Spam and Zombie Detection System with Machine Learned Spot Algorithm
Manishankar.S, Sobin E. S
Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1155 - 1157Avoidance of Unauthorized user using Visual Cryptography
Dayanand G Savakar, Pandurang H Biradar