http://WWW.FINALYEARPROJECTS.NET
http://WWW.FINALYEARPROJECTS.NET

Checking delivery availability...

background-sm
Search
3

Updates found with 'users'

Page  1 1

Updates found with 'users'

JAVA PROJECTS ABSTRACT 2016-2017 A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM ABSTRACT:Abstract :Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as ”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and circulative horizontal and vertical bars covering the entire scope of pass-images, PassMatrix offers no hint for attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. We also implemented a PassMatrix prototype on Android and carried out real user experiments to evaluate its memorability and usability. From the experimental result, the proposed system achieves better resistance to shoulder surfing attacks while maintaining usability. Existing Systems: In order to be more secure than the existing Android pattern password with entropy 18:57 bits against brute force attacks, users have to set two pass-images and use the graphical method to obtain the one-time login indicators. Like most of other graphical password authentication systems, PassMatrix is vulnerable to random guess attacks based on hot-spot analyzing. TEXTUAL passwords have been the most widely used authentication method for decades. Comprised of numbers and upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force attacks. According to an article in Computer world, a security team at a large company ran a network password cracker and surprisingly cracked approximately 80% of the employees’ passwords within 30 seconds [3]. Textual passwords are often insecure due to the difficulty of maintaining strong ones.Proposed Systems: This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and circulative horizontal and vertical bars covering the entire scope of pass-images, PassMatrix offers no hint for attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. a lot of research on password authentication has been done in the literature. Among all of these proposed schemes, this paper focuses mainly on the graphical-based authentication systems. To keep this paper concise, we will give a brief review of the most related schemes that were mentioned in the previous section. The accuracy perspective focuses on the successful login rates in both sessions, including the practice logins. The usability perspective is measured by the amount of time users spent in each PassMatrix phase.Advantage:Two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. The habitual movements and the preference of users that the attacker may take advantage of to figure out the potential passwords. 1) Any communication between the client device and the server is protected by SSL so that packets or information will not be eavesdropped or intercepted by attackers during transmission. 2) The server and the client devices in our authentication system are trustworthy. 3) The keyboard and the entire screen of mobile devices are difficult to protect, but a small area (around 1:5 cm2) is easy to be protected from malicious people who might shoulder surf passwords. 4) Users are able to register an account in a place that is safe from observers with bad intention or surveillance cameras that are not under proper management.SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Network : LAN Database : My SQL Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: Hardware : Pentium Speed : 1.1 GHz RAM : 1GB Hard Disk : 20 GB Floppy Drive : 1.44 MB Key Board : Standard Windows Keyboard Mouse : Two or Three Button Mouse Monitor : SVGAConclusion:With the increasing trend of web services and apps, users are able to access these applications anytime and anywhere with various devices. In order to protect users’ digital property, authentication is required every time they try to access their personal account and data. However, conducting theauthentication process in public might result in potential shoulder surfing attacks. Even a complicated password can be cracked easily through shoulder surfing. Using traditional textual passwords or PIN method, users need totype their passwords to authenticate themselves and thus these passwords can be revealed easily if someone peeks over shoulder or uses video recording devices such as cell phones.
Send Enquiry
Read More
ANDROID PROJECT ABSTRACT 2016-2017 PRIVACY-PRESERVING LOCATION SHARING SERVICES FOR SOCIAL NETWORKS ABSTRACT:A common functionality of many location-based social networking applications is a location sharing service that allows a group of friends to share their locations. With a potentially untrusted server, such a location sharing service may threaten the privacy of users. Existing solutions for Privacy-Preserving Location Sharing Services (PPLSS) require a trusted third party that has access to the exact location of all users in the system or rely on expensive algorithms or protocols in terms of computational or communication overhead. Other solutions can only provide approximate query answers. To overcome these limitations, we propose a new encryption notion, called Order-Retrievable Encryption (ORE), for PPLSS for social networking applications. The distinguishing characteristics of our PPLSS are that it (1) allows a group of friends to share their exact locations without the need of any third party or leaking any location information to any server or users outside the group, (2) achieves low computational and communication cost by allowing users to receive the exact location of their friends without requiring any direct communication between users or multiple rounds of communication between a user and a server, (3) provides efficient query processing by designing an index structure for our ORE scheme, (4) supports dynamic location updates, and (5) provides personalized privacy protection within a group of friends by specifying a maximum distance where a user is willing to be located by his/her friends. Experimental results show that the computational and communication cost of our PPLSS is much better than the state-of-the-art solution.
Send Enquiry
Read More
ANDROID PROJECT ABSTRACT 2016-2017 UNDERSTANDING SMARTPHONE SENSOR AND APP DATA FOR ENHANCING THE SECURITY OF SECRET QUESTIONS ABSTRACT:Many web applications provide secondary authentication methods, i.e., secret questions (or password recovery questions), to reset the account password when a user’s login fails. However, the answers to many such secret questions can be easily guessed by an acquaintance or exposed to a stranger that has access to public online tools (e.g., online social networks); moreover, a user may forget her/his answers long after creating the secret questions. Today’s prevalence of smartphones has granted us new opportunities to observe and understand how the personal data collected by smartphone sensors and appscan help create personalized secret questions without violating the users’ privacy concerns. In this paper, we present a Secret-Question based Authentication system, called “Secret-QA”, that creates a set of secret questions on basic of people’s smartphone usage. We develop a prototype on Android smartphones, and evaluate the security of the secret questions by asking the acquaintance/stranger who participate in our user study to guess the answers with and without the help of online tools; meanwhile, we observe the questions’ reliability by asking participants to answer their own questions. Our experimental results reveal that the secret questions related to motion sensors, calendar, app installment, and part of legacy appease history (e.g., phone calls) have the best memorability for users as well as the highest robustness to attacks.
Send Enquiry
Read More
IEEE 2016 -2017 BIG DATA ANDROID DOTNET JAVA TITLESBIG DATA1. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce.ss2. Self-Healing in Mobile Networks with Big Data.ANDROID1. An Exploration of Geographic Authentication Schemes.2. Intelligent Hands Free Speech based SMS System on Android.3. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords.4. Privacy-Preserving Location Sharing Services for Social Networks.5. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones.6. A Shoulder Surfing Resistant Graphical Authentication System.7. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies.8. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users.9. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions..NET1. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing.2. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing3. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing4. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal5. Cloud workflow scheduling with deadlines and time slot availability6. Dynamic and Public Auditing with Fair Arbitration for Cloud Data7. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems8. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates9. Identity-Based Encryption with Cloud Revocation Authority and Its Applications10. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud11. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection12. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud13. Providing User Security Guarantees in Public Infrastructure Clouds14. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys15. Reversible Data Hiding in Encrypted Images by Reversible Image Transformation16. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage17. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption18. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps19. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis20. A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets DetectionJAVA1. A Locality Sensitive Low-Rank Model for Image Tag Completion2. A Shoulder Surfing Resistant Graphical Authentication System3. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments4. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search5. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage6. Mining User-Aware Rare Sequential Topic Patterns in Document Streams7. Mitigating Cross-Site Scripting Attacks with a Content Security Policy8. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy9. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases10. SecRBAC: Secure data in the Clouds11. Tag Based Image Search by Social Re-rankingCLOUD COMPUTING1. Cost Minimization for Rule Caching in Software Defined Networking.2. Performance Enhancement of High-Availability Seamless Redundancy (HSR) Networks Using OpenFlow.3. Data Plane and Control Architectures for 5G Transport Networks.4. HBD: Towards Efficient Reactive Rule Dispatching in Software-Defined Networks.5. SDN-based Application Framework for Wireless Sensor and Actor Networks.6. Geo-Social Distance-based Data Dissemination for Socially Aware Networking.7. An Open-Source Wireless Mesh Networking Module for Environmental Monitoring.8. Hybrid IP/SDN networking: open implementation and experiment management tools.9. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges.10. Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System.NETWORK SECUIRTY1. Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing.DATA MINING1. Systematic Determination of Discrepancies Across Transient Stability Software Packages.2. Identification of Type 2 Diabetes Risk Factors Using Phenotypes Consisting of Anthropometry and Triglycerides based on Machine Learning.3. Teaching Network Security With IP Darkspace Data.4. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection.5. Mining High Utility Patterns in One Phase without Generating Candidates.6. An Improved String-Searching Algorithm and Its Application in Component Security Testing.
Send Enquiry
Read More
Page 1 1