Privacy Preserving Architecture Using Captcha & Number Grid in Cloud Systems

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-30 Number-3
Year of Publication : 2015
Authors : K.Divya, V.Goutham Prakash

MLA

K.Divya, V.Goutham Prakash "Privacy Preserving Architecture Using Captcha & Number Grid in Cloud Systems". International Journal of Computer Trends and Technology (IJCTT) V30(3):121-126, December 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
CAPTCHA is an acronym for Completely Automated Public Turning Test to distinguish Computers and Humans One from the other. Captcha is one of the broadly utilized strategies for keeping malevolent system from getting to the web asset naturally. Presently a day's for web security there exists diverse sort of Captcha, for example, content Captcha, picture Captcha, sound Captcha and feature captcha. In this paper online security plan is developed with content and graphicalpasswords. Captcha and Graphical passwords are incorporated and a novel group of graphical secret key frameworks based on top of Captcha innovation is called as Captcha as graphical passwords (CaRP). TheCaRPplan is upgraded with more assault taking care of instruments that enhances the level of security in online application framework furthermore gives better verification. The security activity work is extremely essential one altogether registering components of empowered stage, the work of this task states about usage of Graphical Password Validation utilizing CaRP (Captcha as graphical Passwords).This new security primitive is taking into account hard AI issues. It is based on both writings based Captcha and imagerecognition based Captcha. Here the pictures utilized as a part of CaRP are bended arrangement as like Captcha difficulties. It's a sort of verification reaction test. It addresses the different security based assaults. It guarantees the clients with secured login verification. It fit well with the some reasonable applications.

References
[1] R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords:Learning from the first twelve years,”ACMComput. Surveys, vol. 44,no. 4, 2012.
[2] (2012, Feb.). The Science BehindPassfaces [Online]. Available:http://www.realuser.com/published/ScienceBehindPassface s.pdf
[3] I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The designand analysis of graphical passwords,” in Proc. 8th USENIX SecuritySymp., 1999, pp. 1–15.
[4] H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability ofgraphical passwords,”Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292,2008.
[5] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon,“PassPoints: Design and longitudinal evaluation of a graphical passwordsystem,”Int. J. HCI, vol. 63, pp. 102–127, Jul. 2005.
[6] P. C. van Oorschot and J. Thorpe, “On predictive models and userdrawn graphical passwords,”ACM Trans. Inf. Syst. Security, vol. 10,no. 4, pp. 1–33, 2008.
[7] K. Golofit, “Click passwords under investigation,” in Proc. ESORICS,2007, pp. 343–358.
[8] A. E. Dirik, N. Memon, and J.-C.Birget, “Modeling user choice in thepasspoints graphical password scheme,” inProc.Symp. Usable PrivacySecurity, 2007, pp. 20–28.
[9] J. Thorpe and P. C. van Oorschot, “Human-seeded attacks and exploitinghot spots in graphical passwords,” in Proc. USENIX Security, 2007,pp. 103–118.
[10] P. C. van Oorschot, A. Salehi-Abari, and J. Thorpe, “Purely automatedattacks on passpoints-style graphical passwords,” IEEE Trans. Inf.Forensics Security, vol. 5, no. 3, pp. 393–405, Sep. 2010.
[11] P. C. van Oorschot and J. Thorpe, “Exploiting predictability in clickbased graphical passwords,” J. Comput. Security, vol. 19, no. 4,pp. 669–702, 2011.
[12] T. Wolverton. (2002, Mar. 26). Hackers Attack eBay Accounts[Online]. Available: http://www.zdnet.co.uk/news/networking/2002/03/26/hackers-attackebay- accounts-2107350/
[13] HP TippingPointDVLabs, Vienna, Austria.(2010). Top Cyber SecurityRisks Report, SANS Institute and Qualys Research Labs [Online].Available: http://dvlabs.tippingpoint.com/toprisks2010
[14] B. Pinkas and T. Sander, “Securing passwords against dictionaryattacks,” inProc. ACM CCS, 2002, pp. 161–170.
[15] P. C. van Oorschot and S. Stubblebine, “On countering online dictionaryattacks with login histories and humans-in-the-loop,” ACM Trans. Inf.Syst. Security, vol. 9, no. 3, pp. 235–258, 2006

Keywords
CaRP, click based authentication, Graphicalpassword, recognition based validation, Hash visualization, usable security.