3 Level Security System

DOI : 10.17577/IJERTCONV3IS28001

Download Full-Text PDF Cite this Publication

Text Only Version

3 Level Security System

Anaswara Davis

Dept of Computer Science, St.JosephsCollege, Irinjalakuda

Abstract Increasing security has always been a matter of apprehension since Internet and Web Development came into subsistence. In todays world, text based passwords are not enough to provide full security to the system, which isalso an outdated approach now. So we need something more secure along with being more user forthcoming. 3 Level Security System is easy-to-use user affable software. 3 Level security system provides security in all possible ways by using image based authentication and also a onetime password system which is been sent to the registered email together with the conventional method of text based authentication.

Keywords Authentication, Image based authentication, onetime password, Security, Text based authentication

INTRODUCTION

Authentication and security are two terms which are inter- related. Authentication is the act of confirming the exactness of an attribute of a distinct piece of data (datum) or entity. It is actually the process of confirming the identity. Authentication often involves verifying the legitimacy of at least one form of identification.Security is the capability of a system to protect information and system resources with respect to confidentiality and integrity.

The3 level security system aims to guarantee more security through its three levelsThrough Text Password; Through Image based Password, and Through One-Time Automated Password.

The 3 level security system is a security system which provides full security for those users who have been registered in this system. This system can be used as a doorway of security to any type of sites, as well as it can also be used as a safety system for desktop applications too. The registered users can also update the data they used while registration. Hence this is a system which provides more security than the conventional systems. It is an application that is generally intended for providing security for any type of applications, sites, etc. In this system, users can first register in the system and after the registration process; the users can login to the system using the same details they provided during the registration. As this system has 3 levels of security, any intruder will not be able to hack the details of the users.

SYSTEM ARCHITECTURE

User

User

Text based authentication

Text based authentication

Image Based authentication

Image Based authentication

Login to System

Login to System

Email Authentication

Email Authentication

Figure 1.System Architecture

In this Security System, User enters by registering in the system. While registering into the system they have to go through the following levels –

  • Firstly, the user has to fill their details and along with that they can choose a text based username and a password which will be used while logging into the system as the first step.

  • Second, the user has to choose 3 images from 3 grids which will use as the second step of logging in.

    Figure 3.Image Selection

    The registration gets completed there.

    While logging into the system the user has to through 3 levels –

    • First, they have to enter the username and password they have given while registering in the system.

      Figure 4.Text Based Authentication

    • Secondly, they have to choose the same

      3 images from 3 grids that they had already chosen while registering

      Figure 5.Image Based Authentication

    • Thirdly, an OTP (onetime password) will be send to the email id they had given while registering on successful completion of the first 2 levels. The user has to enter that OTP in the system; if the given OTP is correct then the user can successfully login to the system.

Figure 5.One time password

CONCLUSION

This is software which provides better security as there are 3 security levels used together as well as features like, sending automated OTP to users email-id ensures the best security. The software provides a very efficient and secure system. The work is mainly intended for providing security for any type of applications,sites,etc. This System is designed for the use of people who want to secure their data more efficiently, so that no one can hack it.

The 3 level security approach applied on the above system makes it highly secure along with being more user affable. This system will definitely help thwarting Shoulder attack, Tempest attack and brute-force attack at the client side. 3-Level Security system is definitely a time overwhelming approach, as the user has to traverse through the three levels of security, and will need to refer to his e-mail for the generated one-time automated password. This system cannot be a suitable solution for general security purposes, where time complexity will be an issue. But will definitely be

a boon in areas where high security is the main issue, and time complexity is secondary. As an example we can take the case of a firm where this system will be accessible only to some higher designation holding people, who need to store and maintain their crucial and confidential data secure. In near future not only we will add more features but also will make our system customizable..

FUTURE SCOPE

The world is being mechanized and all the offices and institutions are being computerized. So the use and need for this software will not decline. Also man always like to see all works getting more secure. Since we are living in a world of smart technologies like smart phones, tablets, notebooks etc, it would be a future scope to use the GSM features to send the automated onetime password to the users registered mobile number as text message instead of OTP being sent to email. Its also an option to choose the instant messaging services like Whatsapp, Wechat etc as another alternatives for sending OTP.

ACKNOWLEDGEMENT

First of all, I would like to thank God, the Almighty, for having made everything possible by giving the strength and courage to do this paper work. Without him, I would not have had the wisdom or the physical ability to accomplish this paper. I also like to express my deep gratitude to all those people who have helped me to carry out this work..

. A lot of people have directly or indirectly contributed to this project in a variety of ways.

REFERENCES

  1. Nitin, Durg Singh Chauhan, Sohit Ahuja, Pallavi Singh, Ankit Mahanot, Vineet Punjabi, Shivam Vinay, Manisha Rana, Utkarsh Shrivastava and Nakul Sharma Security Analysis and Implementation of JUIT-IBA System using Kerberos Protocol, Proceedings of the 7th IEEE International Conference on Computer and Information Science.

  2. www.ijesr.org

  3. http://www.ijedr.org

  4. http://grietinfo.in/projects/MAIN/IT2013/cd-6- combined%20doc.pdf

  5. http://grietinfo.in/projects/MAIN/IT/DT-DOC-abs.pdf

  6. Security Analysis and Implementation of 3-Level Security System Using Image Based Authentication, Author: Surabhi Anand, Priya Jain, Nitin and Ravi Rastogi

  7. S3PAS:A Scalable Shoulder-Surfing Resistant Textual Graphical Password Authentication Scheme, Author: Huanyu Zhao and Xiaolin Li

  8. Implementation of Security System Using 3-Level Authentication, Author: Nagesh.D Kamble, J.Dharani

Leave a Reply