A Colour Scheme Authenticated Tutor Booking Website
Downloads
Authentication is the first and most important step in information security. Traditional password authentication systems are not strong enough to cope with the current age of cybercrime because passwords can be easily predicted by attackers. This paper aims at reducing threats from different malicious activities to a great extent, thereby increasing security and efficiency, proving it to be very advantageous in today’s world where confidential data security has become so essential. This system provides users with the freedom to have complete security while handling their confidential data and security essential systems from anywhere.
The colour code authentication scheme is executed using colour features for passwords, where users have to select a colour code as password item in terms of the uniqueness and reliability with which it can be entered. This technique uses a grid for session passwords generation and is resistant to dictionary attacks, brute force attacks, and shoulder-surfing. The colour scheme allocated ratings to colours, based on these ratings and the grid displayed during login, session passwords were generated. This work explored a new and easy password authentication system devoid of memorization and recall. This authentication system makes data more secure as only the colour rating at the registration phase needs to be remembered. The Colour based authentication system would provide an efficient way to encrypt account details for sensitive applications such as defense and banking.
Asraful Haque, Babbar Imam, (2014) “A New Graphical Password: Combination of Recall and Recognition Based Approach”, World Academy of Science Engineering and Technology International Journal of Computer, Information, Systems and Control Engineering Vol: 8 No: 2.
Blonder G. E. (1996) "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States.
Davis D., Monrose F., and Reiter M. K., (2004) “On user choice in graphical password schemes,” in Proc. 13th USENIX Security Symposium, San Diego, CA, Page 1-14.
Munir, K., and Mohammed, L. A. (2019). Comparing user authentication techniques for fog computing. In Advancing Consumer-Centric Fog Computing Architectures (pp. 111-125). IGI Global.
He D., Gao Y., Chan S., Chen C., Bu J. (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sensor Wireless Network 10(4): Page 361-371.
Fernández-Otoya, F. A., Raposo-Rivas, M., and Halabi-Echeverry, A. X. (2022). A qualitative systematic literature review on phonological awareness in preschoolers supported by information and communication technologies. Education Sciences, 12(6), 382.
Jansen W, (2003) "Authenticating Users on Handheld Devices “in Proceedings of Canadian Information Technology Security Symposium
Pradhan, S., and Giri, C. K. (2016). Role of different cryptographic algorithms in information security on web. International Journal of Engineering and Management Research (IJEMR), 6(5), 339-345.
Ever, Y. K. (2018). Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor networks. IEEE systems journal, 13(1), 456-467.
Bokolo, A., Maureen, G. P., and Majid, M. A. (2021). A web deployed multi-agent based approach for student-lecturer appointment scheduling in institutions of higher learning. In Journal of Physics: Conference Series (Vol. 1830, No. 1, p. 012007). IOP Publishing.