Downloads: 120 | Views: 174
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015
Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication ? Research Paper
Abstract: In case, somebody once see a user entering the graphical password can easily remember or guess the pattern and can take access to the device. Our major goal is to overcome this security issue and to use the password on the cloud platforms for the administrator panels for various cloud applications. Using this password scheme, the touch screen friendly secure administration interfaces can be developed to give the administrators an easy access to the administration panel. In this research, a multi-level password authentication scheme has been proposed for the administrator panels, where the administrators would be prompted to enter the first-level password at first and second-level password can be used to access more critical administration areas in order to protect the power user accounts from hacking attempts. A user when signup creates and stores a pattern by joining the number points or by selecting the images to create a password, the password is converted into a hash which is further sent to the server for the authentication purposes. The server returns the decision logic which is responsible to accept or deny the login request. To gain the access to the device, the user has to remember the graphical passwords and need to enter the same sequence every time drawing a pattern. The proposed scheme has been evaluated as effective, robust, ease of access and wide adaptability of the scheme for the various smart phone platforms. The proposed scheme has been evaluated under various situations. Both of the graphical password schemes have been evaluated individually with various password combinations. The new multi-level graphical password scheme can be considered as a secure scheme for cloud platforms.
Keywords: Cloud Storage, Access Control Model, Attribute based signatures, Multi-tier authentication, Graphical authentication
Edition: Volume 4 Issue 11, November 2015,
Pages: 231 - 236