Virtual Environments Provide Mammoth Security for Critical Server
R. N. Muneshwar1, S. K. Sonkar2
1R.N.Muneshwar, Department of Computer Engineering, Sangamner, India.
2Prof. S.K. Sonkar, Department of Computer Engineering, Sangamner, India.
Manuscript received on January 21, 2013. | Revised Manuscript received on February 04, 2013. | Manuscript published on February 28, 2013. | PP: 536-541 | Volume-2 Issue-3, February 2013. | Retrieval Number: C1187022313/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Security is the key factor of resolution of computer era. In every field of computer it may be cloud computing, neural network, data ware house, data mining, or grid computing in every field the security is central theme. We can provide the security by means of authentication process. Authentication is nothing but the process of validating who you are to whom you claim to be. The most common approach for authentication is alphanumeric passwords. Traditionally, alphanumeric passwords have been used for authentication. The textual passwords meets with the two conflicting things a) Passwords should be easy to remember, at the same time (b) Passwords hard to guess. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Now day’s graphical passwords are other alternatives. Our paper reports to the comparison study between the different graphical password schemes and the alphanumeric passwords. Through we present and evaluate the 3-D password. The 3-D password is a multifactor authentication scheme. The 3-D password presents a 3-D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3-D password is simply the combination and the sequence of user interactions that occur in the 3-D virtual environment. The 3-D password can combine recognition-, recall-, token-, and biometrics-based systems into one authentication scheme. This can be done by designing a 3-D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometrical data to be verified.
Keywords: Authentication, biometrics, graphical passwords, multifactor, textual passwords, 3-D passwords, 3-D virtual environment.