Journal article Open Access

Providing Security in Multiserver Authentication Scheme using Efficient Three Factor Encryption

Mohammad Majid Masroor; Kushagra Mishra; E. Sasikala


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="URL">https://zenodo.org/record/5851996</identifier>
  <creators>
    <creator>
      <creatorName>Mohammad Majid Masroor</creatorName>
      <affiliation>Computer Science &amp; Engineering, SRM  Institute of Science and Technology, Chennai, India.</affiliation>
    </creator>
    <creator>
      <creatorName>Kushagra Mishra</creatorName>
      <affiliation>Computer Science &amp; Engineering, SRM Institute of  Science and Technology, Chennai, India.</affiliation>
    </creator>
    <creator>
      <creatorName>E. Sasikala</creatorName>
      <affiliation>Computer Science &amp; Engineering, SRM Institute of Science  and Technology, Chennai, India.</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Providing Security in Multiserver  Authentication Scheme using Efficient Three  Factor Encryption</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2020</publicationYear>
  <subjects>
    <subject>Authentication, Factor, Multiserver. Two, Three</subject>
    <subject subjectScheme="issn">2277-3878</subject>
    <subject subjectScheme="handle">A2877059120/2020©BEIESP</subject>
  </subjects>
  <contributors>
    <contributor contributorType="Supervisor">
      <contributorName>Blue Eyes Intelligence Engineering  and Sciences Publication(BEIESP)</contributorName>
      <affiliation>Publisher</affiliation>
    </contributor>
  </contributors>
  <dates>
    <date dateType="Issued">2020-07-30</date>
  </dates>
  <language>en</language>
  <resourceType resourceTypeGeneral="JournalArticle"/>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/5851996</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="ISSN" relationType="IsCitedBy" resourceTypeGeneral="JournalArticle">2277-3878</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.35940/ijrte.A2877.079220</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;For last couple of months, Using Two Factor Authentication was not so secure to protect the data inheriting from Multiserver Authentication. Providing Three Factor Authentication helped a lot in these fields to enhance the security while decrypting the encrypted files but failed in many aspects as there were no Multiserver Authentication was used. Here, the approach is used to provide security in Multiserver Platform Using Three Factor Encryption efficiently so as to remove 99.9% chances of failure in security from decryption of the files without going through Three Factor Security present at different Servers to verify at same time and providing permission to access. For the duration between Feb. 2019 and Jan 2020, There were millions of cases reporting loss of data even having two factor authentication, It happens in a way to get through the first factor on first server taking approval, and the packet can be dropped in-between to use that authentication to get through the second factor on second server to access the data. With the improvement of spread choosing development to the degree unfaltering quality and point of confinement and boundless affiliation have been set as parameters to improve. So, we have implemented these changes in our model to reduce the complexity by this effect providing more security using different layers and format to keep the file secure and going through 3-layer security and authentication before getting access.&lt;/p&gt;</description>
  </descriptions>
</resource>
14
12
views
downloads
Views 14
Downloads 12
Data volume 3.4 MB
Unique views 12
Unique downloads 12

Share

Cite as