Performance Analysis of Bag of Password Authentication using Python, Java and PHP Implementation

In today's world, the data storage is getting increased due to (i) business and banking information, (ii) personalized data, (iii) research improvements on the field of data retrieval, pattern and future prediction over the retrieved data, (iv) improvement in machine learning algorithms, (v) so...

Full description

Saved in:
Bibliographic Details
Published in2021 6th International Conference on Communication and Electronics Systems (ICCES) pp. 1032 - 1039
Main Authors M, Balajee R, V, Murali Mohan, K, Jayanthi Kannan M
Format Conference Proceeding
LanguageEnglish
Published IEEE 08.07.2021
Subjects
Online AccessGet full text
DOI10.1109/ICCES51350.2021.9489233

Cover

Abstract In today's world, the data storage is getting increased due to (i) business and banking information, (ii) personalized data, (iii) research improvements on the field of data retrieval, pattern and future prediction over the retrieved data, (iv) improvement in machine learning algorithms, (v) social media and (vi) higher e-mail transactions. If the information value is higher, then that increases possibility and attracts hacker towards the available or transacted information. This clearly says that the field area of research is very much in need to focus and further improvement towards authentication security. The authentication security can be provided by using some devices like (i) finger print sensor, (ii) face recognition devices, etc., but these leads to additional cost and additional device dependent which reduces the ease approach of authentication. When the authentication mechanism need to be improved without any additional sensors then the password entering scheme will come into the picture and this password entering mechanism can be researched and improved better. This leads to the found, bag of password approach. In the bag of password technique, the major issue found is on the end user side to remember multiple passwords for authentication purpose. This issue is been addressed by making the uniform distribution passwords and reducing probability of every password occurrence at least once. As a result here for the proposed technique, the best programmatic language will be selected from the three trending programming languages like PHP, Python and Java to implement and recommending those based on various aspects for authentication mechanism.
AbstractList In today's world, the data storage is getting increased due to (i) business and banking information, (ii) personalized data, (iii) research improvements on the field of data retrieval, pattern and future prediction over the retrieved data, (iv) improvement in machine learning algorithms, (v) social media and (vi) higher e-mail transactions. If the information value is higher, then that increases possibility and attracts hacker towards the available or transacted information. This clearly says that the field area of research is very much in need to focus and further improvement towards authentication security. The authentication security can be provided by using some devices like (i) finger print sensor, (ii) face recognition devices, etc., but these leads to additional cost and additional device dependent which reduces the ease approach of authentication. When the authentication mechanism need to be improved without any additional sensors then the password entering scheme will come into the picture and this password entering mechanism can be researched and improved better. This leads to the found, bag of password approach. In the bag of password technique, the major issue found is on the end user side to remember multiple passwords for authentication purpose. This issue is been addressed by making the uniform distribution passwords and reducing probability of every password occurrence at least once. As a result here for the proposed technique, the best programmatic language will be selected from the three trending programming languages like PHP, Python and Java to implement and recommending those based on various aspects for authentication mechanism.
Author V, Murali Mohan
K, Jayanthi Kannan M
M, Balajee R
Author_xml – sequence: 1
  givenname: Balajee R
  surname: M
  fullname: M, Balajee R
  email: balajee.rm@gmail.com
  organization: Koneru Lakshmaiah Education Foundation, Vaddeswaram,Department of Computer Science and Engineering,Guntur,Andhra Pradesh,India
– sequence: 2
  givenname: Murali Mohan
  surname: V
  fullname: V, Murali Mohan
  email: muralimohan.klu@gmail.com
  organization: Koneru Lakshmaiah Education Foundation, Vaddeswaram,Department of Computer Science and Engineering,Guntur,Andhra Pradesh,India
– sequence: 3
  givenname: Jayanthi Kannan M
  surname: K
  fullname: K, Jayanthi Kannan M
  email: dr.mkjayanthi.ju@gmail.com
  organization: JAIN (Deemed to be University),Faculty of Engineering and Technology,Department of Computer Science and Engineering,Bangalore,India
BookMark eNotj7tOwzAAAI0EA5R-AQP-ABL8jj2GqNCgSkQC5uLEdmspsas4BeXveXW65XTSXYHzEIMF4BajHGOk7uuqWr1yTDnKCSI4V0wqQukZWKpCYiE4o1wW-BJ8NHZ0cRx06Cwsg-7n5BOMDj7o3S8andJXHA0sj9Pehsl3evIxwGPyYQebedrHcAef9aeGOhjYrBtYD4feDj_un3kNLpzuk12euADvj6u3ap1tXp7qqtxkHmM5ZUIhjrFjjHVSCe2IIRyZgjrCMZO845ZxR5BxBRHWtcpYwxRSSrWqaDsk6ALc_He9tXZ7GP2gx3l7-qbfE9VSxQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCES51350.2021.9489233
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781665435871
1665435879
EndPage 1039
ExternalDocumentID 9489233
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i118t-690511f444c896af2d250d73f251485c5e45f20df726efb9ded490999b97bc063
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:00 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i118t-690511f444c896af2d250d73f251485c5e45f20df726efb9ded490999b97bc063
PageCount 8
ParticipantIDs ieee_primary_9489233
PublicationCentury 2000
PublicationDate 2021-July-8
PublicationDateYYYYMMDD 2021-07-08
PublicationDate_xml – month: 07
  year: 2021
  text: 2021-July-8
  day: 08
PublicationDecade 2020
PublicationTitle 2021 6th International Conference on Communication and Electronics Systems (ICCES)
PublicationTitleAbbrev ICCES
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7660105
Snippet In today's world, the data storage is getting increased due to (i) business and banking information, (ii) personalized data, (iii) research improvements on the...
SourceID ieee
SourceType Publisher
StartPage 1032
SubjectTerms Authentication
Authentication Security
Bag of Password
Java
Machine learning algorithms
Memory
Performance analysis
PHP
Probability of Password Occurrence
Python
Security
Social networking (online)
Uniform Distribution
User remembrance
Title Performance Analysis of Bag of Password Authentication using Python, Java and PHP Implementation
URI https://ieeexplore.ieee.org/document/9489233
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp5UNvE3OXhcu_5I0vbq2JiDSUEHu82keRkidiKdon-9L2ndUDx4aikJLXmB973X7_tCyJWGVEgmlCcziD0WQeGpAqtW3DyJCHTBpHPgm92KyZxNF3zRIv2tFgYAHPkMfHvr_uXrdbGxrbJBxlLEI3GbtJNU1FqthrIVBtngZjgc3fEw5gGWfVHoN6N_HJvissZ4n8y-31eTRZ78TaX84vOXFeN_P-iA9Hb6PJpvM88haUHZJQ_5TgNAv71G6NrQa7mylxxh8juWmtR2xSxHqG7WUct8X9H8w5oI9OlUvkkqS03zSU6ddfBzo04qe2Q-Ht0PJ15zfoL3iGVD5QnrvRUaxliRZkKaSCPe0UlsENOwlBccGDdRoE0SCTAq06BZZhGjyhIMmIiPSKdcl3BMqEJgh9BJ4lDGwIDEaYIrBD_GcBnACena1Vm-1BYZy2ZhTv9-fEb2bIQc6zU9J53qdQMXmNsrdemC-gXYRKYf
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEN0gHvSkBozf7sEjLf3YXdqrBFIQSBMh4Ybb7iwxxmJM0eivd7YtGI0HT22abdrMNJk30_feEnKjIBCSicSSIfgW8yC1khS7Vvx4OsJRKZOFA994IqIZG875vEZaWy0MABTkM7DNafEvX63StRmVtUMWIB7xd8guZ4zxUq1VkbZcJ2wPut3ePXd97mDj57l2tf7HxilF3egfkPHmiSVd5Mle54mdfv4yY_zvKx2S5rdCj8bb2nNEapA1yEP8rQKgG7cRutL0Vi7NIUag_I7NJjVzMcMSKsd11HDflzT-MDYCLTqUb5LKTNE4imlhHvxc6ZOyJpn1e9NuZFU7KFiP2DjkljDuW67GYKVBKKT2FCIe1fE1ohoW8JQD49pzlO54AnQSKlAsNJgxCTuYMuEfk3q2yuCE0AShHYIniUsZAw0SbxM8QfijNZcOnJKGic7ipTTJWFSBOfv78jXZi6bj0WI0mNydk32TrYIDG1yQev66hkus9HlyVST4C7lVqWw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+6th+International+Conference+on+Communication+and+Electronics+Systems+%28ICCES%29&rft.atitle=Performance+Analysis+of+Bag+of+Password+Authentication+using+Python%2C+Java+and+PHP+Implementation&rft.au=M%2C+Balajee+R&rft.au=V%2C+Murali+Mohan&rft.au=K%2C+Jayanthi+Kannan+M&rft.date=2021-07-08&rft.pub=IEEE&rft.spage=1032&rft.epage=1039&rft_id=info:doi/10.1109%2FICCES51350.2021.9489233&rft.externalDocID=9489233