35
Multilayer Parallel User Authentication SCHEME BY : Hemprasad Badgujar

Hem second presentation

Embed Size (px)

Citation preview

  1. 1. INTROIntroductionAGENDAExplanation of statusabout project with sub projectsas well assub modules with theirinteraction & interconnectionswith each other forcomputing & managing
  2. 2. PURPOSEPurpose of a ProjectAGENDAProvide High Securityto user by usingmultilayer authentication systemin local , Network & CloudSystems OnGPU enabled Devices
  3. 3. PLATFORMPlatform & EnvironmentAGENDAPlatform as computer systemwith HPC capability with help ofGPUsNeed of Smart I/O Devices ,Smart Devices for Interaction
  4. 4. SURVEYSurvey of Research MaterialAGENDAResearch PapersResearch WebsitesTechnical ConferencesTechnical ForumsInternational JournalsProject GuidePersonal ExperienceImagination & Hypothesis
  5. 5. Timeline & Grant ChartAGENDAProject Work flowthroughout 1st & 2nd semesterWith Process modules& planning ofpublishing research Papersas well asday by day projectprogress trackingTIMELINE
  6. 6. Results & ChartsAGENDAObtained & proposed results Security Optimization User Interface Usability Compare Past AuthenticationRESULTS
  7. 7. Any SuggestionsAGENDAWaiting For Suggestions Guidance Questions QueriesAny else !!ANY
  8. 8. What You Know KnowledgeWhat You Have Hard/SoftWhat You Are" Biometric"What You Can " Intelligence"What You Recognize" RecognitionHUMANAUTHTECHNIQUES
  9. 9. What You Are
  10. 10. MARUTI
  11. 11. * PASSWORD ** GESTURE ** PATH ** CHALLENGE RESPONSE ** TOKENS ** PASS PHRASE ** PIN *
  12. 12. * BODY PRINT ** RETINAL PATTERN ** DNA SEQUENCE ** FACE** VOICE ** EYE ** PALM & THUMB *
  13. 13. * ARTIFICIAL INTELLIGENCE ANSWERS ** MEMORY INTELIGENCE ** COMPLEX SOLUTIONS ** CHALLENGE RESPONSE ** CALL UP ** THINK BACK SYSTEM WORKING*
  14. 14. * OBJECT ** IMAGE** PATTERN ** PATH / WAY ** SOUND / AUDEO ** ANIMATION / VIDEO ** SYSTEM *
  15. 15. Computer SecurityPrevention and Detection of unauthorized actions by usersFor What..??* Confidentiality ** Availability ** Non-repudiation ** Accountability ** Security systems *
  16. 16. The Platforms for which Security will provideMostly Web Applications & web SitesAS* Forums** Social Networking** Search Engines** Cloud Applications** Server Applications Systems** Mailing & Messaging *
  17. 17. Survey for MARUTI requires differentsurvey MaterialAS* Research Papers & Websites ** Technical Conferences & Forums** International Journals ** Project Guide** Personal Experience ** Imagination & Hypothesis *
  18. 18. Survey for Human Identification SystemAS* Research Papers & Websites ** Technical Conferences & Forums** International Journals ** Project Guide** Personal Experience ** Imagination & Hypothesis *
  19. 19. * Distinguishing between Humans and Robots on the Web* Roles in information security : A survey and classification of the research area* Safeguards and security survey and self-assessment toolkit* Building Robust Authentication Systems With Activity-Based Personal Questions* Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs* Modeling Human Behavior for Defense against Flash-Crowd Attacks* Cyber Security Using Arabic CAPTCHA Scheme* Distinguishing Humans from Bots in Web Search Logs* Some thoughts about writing a survey paper
  20. 20. SEARCHSECURITY
  21. 21. HEMBLOG
  22. 22. Project GuideDr. R. C. ThoolPersonal ExperienceCrawling Through Web/Papers/Books/GuideImagination & HypothesisIncrease in secureness in user authentication system with highperformance & User friendly
  23. 23. December JanuaryNovember FebruaryTrial & error forPaper designPlanning FordifferentConferencesTrackingOptimizeresultsTestingPlanning forGTC 2013Result Mergingof all SystemsPublish / reeditPaperComparePapers & results2ndPresentation
  24. 24. MayAprilMarch JuneFuturePlanningFinalTransactionwith paperCombinedResultFINALPresentationFinalize resultswithOptimization
  25. 25. The Ideas Creation about user authenticating SchemesAS* Merging of different authentication Schemes** Overlapping authentication systems ** Use of GPU to improve performance as GPGPU** Creation of Scheme Environment using Parallelism** Achieve parallelism using CUDA/OpenCL** Optimize use of available Hardware*
  26. 26. Waiting ForSuggestions !!Guidance !!Questions !!Queries !!Any else !!