Open Access   Article Go Back

Data Privacy Using Dynamic Multi-Layer Authentication Mechanism in Open Learning Environment

R. Anuratha1 , M. Ganaga Durga2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-08 , Page no. 77-80, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6si8.7780

Online published on Oct 31, 2018

Copyright © R. Anuratha, M. Ganaga Durga . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Anuratha, M. Ganaga Durga, “Data Privacy Using Dynamic Multi-Layer Authentication Mechanism in Open Learning Environment,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.08, pp.77-80, 2018.

MLA Style Citation: R. Anuratha, M. Ganaga Durga "Data Privacy Using Dynamic Multi-Layer Authentication Mechanism in Open Learning Environment." International Journal of Computer Sciences and Engineering 06.08 (2018): 77-80.

APA Style Citation: R. Anuratha, M. Ganaga Durga, (2018). Data Privacy Using Dynamic Multi-Layer Authentication Mechanism in Open Learning Environment. International Journal of Computer Sciences and Engineering, 06(08), 77-80.

BibTex Style Citation:
@article{Anuratha_2018,
author = {R. Anuratha, M. Ganaga Durga},
title = {Data Privacy Using Dynamic Multi-Layer Authentication Mechanism in Open Learning Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {06},
Issue = {08},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {77-80},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=479},
doi = {https://doi.org/10.26438/ijcse/v6i8.7780}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.7780}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=479
TI - Data Privacy Using Dynamic Multi-Layer Authentication Mechanism in Open Learning Environment
T2 - International Journal of Computer Sciences and Engineering
AU - R. Anuratha, M. Ganaga Durga
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 77-80
IS - 08
VL - 06
SN - 2347-2693
ER -

           

Abstract

Cloud computing, delivers abundant services between Cloud Service Providers (CSP) and Cloud Users (CU) on a demand basis in metered service without having the underlying infrastructure with the help of Internet. This ease will increase the cloud users day by day to adopt cloud model. Technological advancements, specially Information Communication Technology (ICT) and cloud computing, transform traditional teaching and learning practices into blended learning. Due to the fabulous development of Massive Open Online Courses (MOOC) and Open Educational Resources (OER), more attention and efforts are crucial to the security procedures for massive open online courses. Authentication of the users to the cloud service is mandatory, because it eliminates the risks and attacks found in the cloud services. Password is widely used for user authentication because of its simplicity. Frequently changing password is a tedious work. Simple passwords are easily hacked, but complicated one is hard to memorize. To overcome this, we suggest Personally Identifiable Information (PII) for the purpose of Authentication. In this paper, we propose a security model using Dynamic Multi-Layer Authentication Mechanism, which is based on user’s personally identifiable information.

Key-Words / Index Term

Authentication, Access Control, Massive Open Online Course, Open Educational Resource, Responsive Open Learning Environment, Self-Regulated Learning

References

[1] Pranav Vyas, Dr. Bhushan Trivedi, An Analysis of Session Key Exchange protocols, International Journal of Engineering Research and Applications, Vol. 2, Issue 4, June-July 2012, pp.658-663, ISSN: 2248-9622, available at www.ijera.com.
[2] Anuratha. R, Dr. Ganaga durga. M, “Authentication – A part of Identification in the Cloud Environment”, International Journal of Advance Research in Science and Engineering, vol. 07, Special Issue 01, January 2018, ISSN 2319-83554, pp. 25-34
[3] Anuratha. R, Dr. Ganaga durga. M, “Analysis of Data Security in Cloud Computing Using Access Control Technique”, International Conference on Global Talent Management in the Digital Era, ISBN: 978-93-86537-95-9, September, 2017.
[4] Sten Govaerts, Katrien Verbert, C. Delgado Kloos et al. (Eds.), Towards Responsive Open Learning Environments: The ROLE Interoperability Framework, EC-TEL 2011, LNCS 6964, pp. 125–138, 2011. Springer-Verlag Berlin Heidelberg 2011.
[5] L. Das, A. Saxena, and V. P. Gulati, "A Dynamic ID-Based Remote User Authentication Scheme," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629 - 631, 2004.
[6] I-En Liao, Cheng-Chi Lee, and Min-Shiang Hwang, "Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme," In Proceeding of International Conference on Next Generation Web Services Practices, 2005 ( NWeSP 2005), pp. 437-40 , 2005.
[7] Y. Yang, R. H. Deng and F. Bao, “A Practical Password- Based Two-Server Authentication and Key Exchange System,” IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 2, 2006, pp. 105-114. doi:10.1109/TDSC.2006.16
[8] J. L. Tsai, “Efficient Multi-Server Authentication Scheme Based on One-Way Hash Function without Verification Table,” Computers & Security, Vol. 27, No. 3-4, 2008, pp. 115-121. doi:1 0.1016/j.cose.2008.04.001
[9] Yi-Pin Liao and Shuenn-Shyang Wang, "A Secure Dynamic ID-Based Remote User Authen- tication Scheme for Multi-Server Environment," Computer Standards & Interfaces, vol. 31, no. 1, pp. 24-29, 2009, available at www.sciencedirect.com.
[10] Han-Cheng Hsiang and Wei-Kuan Shih, "Improvement of the Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment," Computer Standards & Interfaces, vol. 31, no. 6, pp. 1118-1123, 2009.
[11] Cheng-Chi Lee, Tsung-Hung Lin, and Rui-Xiang Chang, "A Secure Dynamic ID Based Re- mote User Authentication Scheme for Multi-Server Environment Using Smart Cards," Expert Systems with Applications, vol. 38, no. 11, pp. 13863-13870, 2011.
[12] N.S Chauhan and A.Saxena, “Energy Analysis of Security for Cloud Application,” in Proc. Annual IEEE India Conference, pp. 1-6, 2011.