Performance Analysis of Bag of Password Authentication using Python, Java and PHP Implementation
In today's world, the data storage is getting increased due to (i) business and banking information, (ii) personalized data, (iii) research improvements on the field of data retrieval, pattern and future prediction over the retrieved data, (iv) improvement in machine learning algorithms, (v) so...
        Saved in:
      
    
          | Published in | 2021 6th International Conference on Communication and Electronics Systems (ICCES) pp. 1032 - 1039 | 
|---|---|
| Main Authors | , , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        08.07.2021
     | 
| Subjects | |
| Online Access | Get full text | 
| DOI | 10.1109/ICCES51350.2021.9489233 | 
Cover
| Abstract | In today's world, the data storage is getting increased due to (i) business and banking information, (ii) personalized data, (iii) research improvements on the field of data retrieval, pattern and future prediction over the retrieved data, (iv) improvement in machine learning algorithms, (v) social media and (vi) higher e-mail transactions. If the information value is higher, then that increases possibility and attracts hacker towards the available or transacted information. This clearly says that the field area of research is very much in need to focus and further improvement towards authentication security. The authentication security can be provided by using some devices like (i) finger print sensor, (ii) face recognition devices, etc., but these leads to additional cost and additional device dependent which reduces the ease approach of authentication. When the authentication mechanism need to be improved without any additional sensors then the password entering scheme will come into the picture and this password entering mechanism can be researched and improved better. This leads to the found, bag of password approach. In the bag of password technique, the major issue found is on the end user side to remember multiple passwords for authentication purpose. This issue is been addressed by making the uniform distribution passwords and reducing probability of every password occurrence at least once. As a result here for the proposed technique, the best programmatic language will be selected from the three trending programming languages like PHP, Python and Java to implement and recommending those based on various aspects for authentication mechanism. | 
    
|---|---|
| AbstractList | In today's world, the data storage is getting increased due to (i) business and banking information, (ii) personalized data, (iii) research improvements on the field of data retrieval, pattern and future prediction over the retrieved data, (iv) improvement in machine learning algorithms, (v) social media and (vi) higher e-mail transactions. If the information value is higher, then that increases possibility and attracts hacker towards the available or transacted information. This clearly says that the field area of research is very much in need to focus and further improvement towards authentication security. The authentication security can be provided by using some devices like (i) finger print sensor, (ii) face recognition devices, etc., but these leads to additional cost and additional device dependent which reduces the ease approach of authentication. When the authentication mechanism need to be improved without any additional sensors then the password entering scheme will come into the picture and this password entering mechanism can be researched and improved better. This leads to the found, bag of password approach. In the bag of password technique, the major issue found is on the end user side to remember multiple passwords for authentication purpose. This issue is been addressed by making the uniform distribution passwords and reducing probability of every password occurrence at least once. As a result here for the proposed technique, the best programmatic language will be selected from the three trending programming languages like PHP, Python and Java to implement and recommending those based on various aspects for authentication mechanism. | 
    
| Author | V, Murali Mohan K, Jayanthi Kannan M M, Balajee R  | 
    
| Author_xml | – sequence: 1 givenname: Balajee R surname: M fullname: M, Balajee R email: balajee.rm@gmail.com organization: Koneru Lakshmaiah Education Foundation, Vaddeswaram,Department of Computer Science and Engineering,Guntur,Andhra Pradesh,India – sequence: 2 givenname: Murali Mohan surname: V fullname: V, Murali Mohan email: muralimohan.klu@gmail.com organization: Koneru Lakshmaiah Education Foundation, Vaddeswaram,Department of Computer Science and Engineering,Guntur,Andhra Pradesh,India – sequence: 3 givenname: Jayanthi Kannan M surname: K fullname: K, Jayanthi Kannan M email: dr.mkjayanthi.ju@gmail.com organization: JAIN (Deemed to be University),Faculty of Engineering and Technology,Department of Computer Science and Engineering,Bangalore,India  | 
    
| BookMark | eNotj7tOwzAAAI0EA5R-AQP-ABL8jj2GqNCgSkQC5uLEdmspsas4BeXveXW65XTSXYHzEIMF4BajHGOk7uuqWr1yTDnKCSI4V0wqQukZWKpCYiE4o1wW-BJ8NHZ0cRx06Cwsg-7n5BOMDj7o3S8andJXHA0sj9Pehsl3evIxwGPyYQebedrHcAef9aeGOhjYrBtYD4feDj_un3kNLpzuk12euADvj6u3ap1tXp7qqtxkHmM5ZUIhjrFjjHVSCe2IIRyZgjrCMZO845ZxR5BxBRHWtcpYwxRSSrWqaDsk6ALc_He9tXZ7GP2gx3l7-qbfE9VSxQ | 
    
| ContentType | Conference Proceeding | 
    
| DBID | 6IE 6IL CBEJK RIE RIL  | 
    
| DOI | 10.1109/ICCES51350.2021.9489233 | 
    
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| EISBN | 9781665435871 1665435879  | 
    
| EndPage | 1039 | 
    
| ExternalDocumentID | 9489233 | 
    
| Genre | orig-research | 
    
| GroupedDBID | 6IE 6IL CBEJK RIE RIL  | 
    
| ID | FETCH-LOGICAL-i118t-690511f444c896af2d250d73f251485c5e45f20df726efb9ded490999b97bc063 | 
    
| IEDL.DBID | RIE | 
    
| IngestDate | Thu Jun 29 18:38:00 EDT 2023 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i118t-690511f444c896af2d250d73f251485c5e45f20df726efb9ded490999b97bc063 | 
    
| PageCount | 8 | 
    
| ParticipantIDs | ieee_primary_9489233 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2021-July-8 | 
    
| PublicationDateYYYYMMDD | 2021-07-08 | 
    
| PublicationDate_xml | – month: 07 year: 2021 text: 2021-July-8 day: 08  | 
    
| PublicationDecade | 2020 | 
    
| PublicationTitle | 2021 6th International Conference on Communication and Electronics Systems (ICCES) | 
    
| PublicationTitleAbbrev | ICCES | 
    
| PublicationYear | 2021 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| Score | 1.7660105 | 
    
| Snippet | In today's world, the data storage is getting increased due to (i) business and banking information, (ii) personalized data, (iii) research improvements on the... | 
    
| SourceID | ieee | 
    
| SourceType | Publisher | 
    
| StartPage | 1032 | 
    
| SubjectTerms | Authentication Authentication Security Bag of Password Java Machine learning algorithms Memory Performance analysis PHP Probability of Password Occurrence Python Security Social networking (online) Uniform Distribution User remembrance  | 
    
| Title | Performance Analysis of Bag of Password Authentication using Python, Java and PHP Implementation | 
    
| URI | https://ieeexplore.ieee.org/document/9489233 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp5UNvE3OXhcu_5I0vbq2JiDSUEHu82keRkidiKdon-9L2ndUDx4aikJLXmB973X7_tCyJWGVEgmlCcziD0WQeGpAqtW3DyJCHTBpHPgm92KyZxNF3zRIv2tFgYAHPkMfHvr_uXrdbGxrbJBxlLEI3GbtJNU1FqthrIVBtngZjgc3fEw5gGWfVHoN6N_HJvissZ4n8y-31eTRZ78TaX84vOXFeN_P-iA9Hb6PJpvM88haUHZJQ_5TgNAv71G6NrQa7mylxxh8juWmtR2xSxHqG7WUct8X9H8w5oI9OlUvkkqS03zSU6ddfBzo04qe2Q-Ht0PJ15zfoL3iGVD5QnrvRUaxliRZkKaSCPe0UlsENOwlBccGDdRoE0SCTAq06BZZhGjyhIMmIiPSKdcl3BMqEJgh9BJ4lDGwIDEaYIrBD_GcBnACena1Vm-1BYZy2ZhTv9-fEb2bIQc6zU9J53qdQMXmNsrdemC-gXYRKYf | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEN0gHvSkBozf7sEjLf3YXdqrBFIQSBMh4Ybb7iwxxmJM0eivd7YtGI0HT22abdrMNJk30_feEnKjIBCSicSSIfgW8yC1khS7Vvx4OsJRKZOFA994IqIZG875vEZaWy0MABTkM7DNafEvX63StRmVtUMWIB7xd8guZ4zxUq1VkbZcJ2wPut3ePXd97mDj57l2tf7HxilF3egfkPHmiSVd5Mle54mdfv4yY_zvKx2S5rdCj8bb2nNEapA1yEP8rQKgG7cRutL0Vi7NIUag_I7NJjVzMcMSKsd11HDflzT-MDYCLTqUb5LKTNE4imlhHvxc6ZOyJpn1e9NuZFU7KFiP2DjkljDuW67GYKVBKKT2FCIe1fE1ohoW8JQD49pzlO54AnQSKlAsNJgxCTuYMuEfk3q2yuCE0AShHYIniUsZAw0SbxM8QfijNZcOnJKGic7ipTTJWFSBOfv78jXZi6bj0WI0mNydk32TrYIDG1yQev66hkus9HlyVST4C7lVqWw | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+6th+International+Conference+on+Communication+and+Electronics+Systems+%28ICCES%29&rft.atitle=Performance+Analysis+of+Bag+of+Password+Authentication+using+Python%2C+Java+and+PHP+Implementation&rft.au=M%2C+Balajee+R&rft.au=V%2C+Murali+Mohan&rft.au=K%2C+Jayanthi+Kannan+M&rft.date=2021-07-08&rft.pub=IEEE&rft.spage=1032&rft.epage=1039&rft_id=info:doi/10.1109%2FICCES51350.2021.9489233&rft.externalDocID=9489233 |