Abstract

Authentication is the first step for any important applications. Password verification is widely employed in the Internet. Some advanced mechanisms including bio features, such as fingerprints or retina. However, digital password authentication credential is commonly used in the public. In other words, traditional password verification is still an important authentication credential mechanism for today’s online services. Password database may be compromised. Once if the database is stolen, it is dangerous and critical for any services. Consequently, password database leakage becomes an important issue. Detection and countermeasure are essential for such a disaster. Our research proposing a scheme based on a authentication database storage mapping method to detect possible leakage of authentication database. By multiple mapping mechanism, if the authentication database is stolen, an attacker could not know any user’s correct password. This method can reduce additional space of storing passwords with ability to detect security event for stolen authentication databases.

Highlights

  • 1 INTRODUCTION Over the past decades, with the popularity of personal computers and mobile devices, the convenience of the Internet, and the development of social networks, more and more people rely on the Internet to deal with or share things on life, such as online payment, online shopping, etc

  • The school provides a variety of online services, such as course enrollment system, online courses, etc., to provide teachers and students a convenient campus life

  • Punithavalli, "LSB, 3D-DCT and Huffman Encoding based Steganography in

Read more

Summary

INTRODUCTION

With the popularity of personal computers and mobile devices, the convenience of the Internet, and the development of social networks, more and more people rely on the Internet to deal with or share things on life, such as online payment, online shopping, etc. Password is still the most important credential for today's account certification. It plays a very important role in human life. The evolution of the password so far has developed a variety of forms to achieve certification. The traditional digital password authentication credential is still widely accepted by the public, but in the past few decades, the content of this certification mechanism hasn’t been much change. The password is the first line of defense, but the file leaks are endless. These common password leak events, causing the user's personal information to be stolen. According to Gemalto's 2016 report [1], the most serious is the account access, followed by identity theft

RELATED WORK
RESEARCH METHODS
IMPACT EVALUATION
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.