International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-12,Issue-4  ( Apr, 2024 )
Past issues
  1. Volume-12,Issue-3  ( Mar, 2024 )
  2. Volume-12,Issue-2  ( Feb, 2024 )
  3. Volume-12,Issue-1  ( Jan, 2024 )
  4. Volume-11,Issue-12  ( Dec, 2023 )
  5. Volume-11,Issue-11  ( Nov, 2023 )
  6. Volume-11,Issue-10  ( Oct, 2023 )
  7. Volume-11,Issue-9  ( Sep, 2023 )
  8. Volume-11,Issue-8  ( Aug, 2023 )
  9. Volume-11,Issue-7  ( Jul, 2023 )
  10. Volume-11,Issue-6  ( Jun, 2023 )

Statistics report
Jul. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 136
Paper Published : 1596
No. of Authors : 4179
  Journal Paper

Paper Title :
To Analysis Various Security and Trust Computation Techniques for Social Networking Model

Author :Vivek Kumar Sinha, Divya

Article Citation :Vivek Kumar Sinha ,Divya , (2021 ) " To Analysis Various Security and Trust Computation Techniques for Social Networking Model " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 26-37, Volume-9,Issue-4

Abstract : Abstract - This paper discusses research works in the field of knowledge-based user authentication covering the security and usability aspects of the most prominent user that has an authentication scheme: - such as text-, pin- and graphical-based. From the field of security, perspective, we analyze current threats from a user and service provider perspective. Trust and repudiation are widely used technique in the multiphase authentication techniques. A number of techniques have been applied for the interpretation and analysis of authentication and authorization data. Knowledge based system consists of password, known activities, favourite place, colour, friendship, known image, etc. Internet of Things (IOT), cloud computing, image processing and data mining techniques (DMT) can utilize to produce a trusted security technique.We will show the technique used in the form of a table which also includes their application area. The aim of the paper is to show comparison of different authentication methods for electronic payment (Debit/credit card, Debit/credit card with a PIN, QR Code with PIN and fingerprint biometrics authentication) in an e-commerce. Security and privacy are major concerned and people give enough attention to protect their privacy sensitive information. It prevents users private information includes interested user or misbehaviour during data sharing and malware detection. Recently even OTPs methodology has gone wrong to deliver proper result i.e via SMS. In order to avoid attacks and offer effective content security to 2PA credentials sent via SMS, an electronic signature of the OTPs can be used also with QA (Question & Answer) mechanism to be implemented. We will define the implementation parameter to do a security analysis of our proposal. This study will help newer researchers to choose appropriate authentication techniques, to deal with the security and trust computation encountered during multiphase authentication. We further discuss the main findings related to this research towards the design of secure, sustainable and usable authentication approaches. Keywords - Authentication Techniques, Security and Trust Computation, Multiphase Authentication

Type : Research paper

Published : Volume-9,Issue-4


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 42
| Published on 2022-02-16
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World