SlideShare a Scribd company logo
An Exploration of Geographic
Authentication Schemes
Abstract
We design and explore the usability and security of two geographic authentication
schemes: GeoPass and GeoPass-Notes. GeoPass requires users to choose a place
on a digital map to authenticate with (a location password). GeoPassNotes—an
extension of GeoPass—requires users to annotate their locationpassword with a
sequence of words that they can associate with the location(an annotated location
password). In GeoPassNotes,users are authenticated by correctly entering both a
location andan annotation. We conducted user studies to test the usability and
assess the security of location passwords and annotated location passwords. The
results indicate that both variants are highly memorable, and that annotated
location passwords may be more advantageous than location passwords alone due
to their increased security and the minimal usability impact introduced by the
annotation.
Existing system:
In Existing system we use GeoPass, in which a user chooses a single place on a
digital map as their password. We perform a multi-session in-lab/at-home user
study of GeoPass involving 35 users over 8-9 days. Our results suggest that
GeoPass is highly memorable: none of the returning participants forgot their
location passwords after one day. Of the 30 participants who returned to login one
week later, only one participant failed to enter their password. There were very few
failed login attempts throughout the entire study. Our security results suggest that
GeoPass provides enough security to protect against online attacks under simple
system-enforced policies. GeoPass may also be useful as a building block for
future geographic authenticati on systems.
Disadvantage :
• GeoPass is certainly vulnerable to offline guessing attacks.
• Additionally, GeoPass may offer weak security against online guessing
attacks in some circumstances (e.g., if it is deployed in a small city or if the
adversary had a method of effectively prioritizing guesses). Thus, prudent
implementations of GeoPass should find another way to increase security.
Proposed system
We propose, implement, and evaluate two systems for geographic authentication:
GeoPass and GeoPassNotes. We evaluate the systems’ security and usability
through two user studies, finding that they both exhibit very strong memorability
(over the span of 8-9 days, there were only two resets for GeoPass and none for
GeoPassNotes). Usability was high in terms of there being few failed logins and
user perceptions of the system. Although 67% of the GeoPass users and 80% of
the GeoPassNotes users indicated that they could easily use the system every day,
we must be cautious about recommending their use on frequently used accounts.
Given that the login times for both systems are longer than text passwords, we
suggest they would be most appropriate in contexts where logins occur
infrequently. For example, it might be useful for infrequently used online accounts
or possibly fallback authentication. We found that annotated location passwords
have the potential to be stronger than text passwords against guessing attacks when
proper policies are applied, thus they may be more desirable for higher-security
environments.
Advantages:
• The geographic authentication schemes we explored appear to be highly
memorable
• it would be interesting to explore other ways to harness this memorability
while enhancing security. One interesting direction is to explore the extent
that the presentation effect can improve security in geographic
authentication systems. Another future direction includes exploring whether
the memorability of geographic locations might translate if used in
mnemonics for text passwords.
Hardware Specification :
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech
• Ram : 512 Mb.
• MOBILE : ANDROID
Software Specification :
• Operating system : Windows 7.
• Coding Language : Java 1.7
• Tool Kit : Android 2.3 ABOVE
• IDE : Android Studio

More Related Content

What's hot

Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
Akshay Surve
 
Shoulder Surfing as future technology
Shoulder Surfing as future technologyShoulder Surfing as future technology
Shoulder Surfing as future technology
Satish Govindappa
 
The newest hacking tools of 2020 so far | ISOEH
The newest hacking tools of 2020 so far | ISOEHThe newest hacking tools of 2020 so far | ISOEH
The newest hacking tools of 2020 so far | ISOEH
Shirsendu Kar
 
Secure Software Distribution in an Adversarial World
Secure Software Distribution in an Adversarial WorldSecure Software Distribution in an Adversarial World
Secure Software Distribution in an Adversarial World
Diogo Mónica
 
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKSUSER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
pharmaindexing
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
Swagato Dey
 

What's hot (6)

Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Shoulder Surfing as future technology
Shoulder Surfing as future technologyShoulder Surfing as future technology
Shoulder Surfing as future technology
 
The newest hacking tools of 2020 so far | ISOEH
The newest hacking tools of 2020 so far | ISOEHThe newest hacking tools of 2020 so far | ISOEH
The newest hacking tools of 2020 so far | ISOEH
 
Secure Software Distribution in an Adversarial World
Secure Software Distribution in an Adversarial WorldSecure Software Distribution in an Adversarial World
Secure Software Distribution in an Adversarial World
 
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKSUSER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 

Similar to A cloud

An exploration of geographic authentication schemes
An exploration of geographic authentication schemesAn exploration of geographic authentication schemes
An exploration of geographic authentication schemes
Shakas Technologies
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
AkashDongre7
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
IEEEFINALYEARSTUDENTSPROJECTS
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
chennaijp
 
An exploration of geographic authentication schemes abstract
An exploration of geographic authentication schemes abstractAn exploration of geographic authentication schemes abstract
An exploration of geographic authentication schemes abstract
Kamal Spring
 
Privacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queriesPrivacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queries
Papitha Velumani
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET Journal
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
swathi78
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
Sahithi Naraparaju
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
chennaijp
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
Editor IJCATR
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
Nandini Chandran
 
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET Journal
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
ijtsrd
 
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
nuruladnan11
 
privacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesprivacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queries
swathi78
 

Similar to A cloud (20)

An exploration of geographic authentication schemes
An exploration of geographic authentication schemesAn exploration of geographic authentication schemes
An exploration of geographic authentication schemes
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
 
An exploration of geographic authentication schemes abstract
An exploration of geographic authentication schemes abstractAn exploration of geographic authentication schemes abstract
An exploration of geographic authentication schemes abstract
 
Privacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queriesPrivacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queries
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
 
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
 
privacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesprivacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queries
 

More from muhammed jassim k

Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
muhammed jassim k
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
Cloud armor:Supporting Reputation-Based Trust Management for Cloud ServiceCloud armor:Supporting Reputation-Based Trust Management for Cloud Service
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
muhammed jassim k
 
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGEELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
muhammed jassim k
 
4.weather based smart watering system using soil sensor and gsm
4.weather based smart watering system using soil sensor and gsm4.weather based smart watering system using soil sensor and gsm
4.weather based smart watering system using soil sensor and gsm
muhammed jassim k
 
26. qo s ranking prediction for cloud services
26. qo s ranking prediction for cloud services26. qo s ranking prediction for cloud services
26. qo s ranking prediction for cloud services
muhammed jassim k
 
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
Energy-Efficient intelligent street lighting system using traffic-adaptive co...Energy-Efficient intelligent street lighting system using traffic-adaptive co...
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
muhammed jassim k
 
Fire col a collaborative protection
Fire col a collaborative protectionFire col a collaborative protection
Fire col a collaborative protection
muhammed jassim k
 
privacy preserving abstract
 privacy preserving abstract privacy preserving abstract
privacy preserving abstract
muhammed jassim k
 
Datamining with big data
 Datamining with big data  Datamining with big data
Datamining with big data
muhammed jassim k
 
33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines
muhammed jassim k
 
An automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networksAn automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networks
muhammed jassim k
 
ALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware
ALTERDROID:Differential fault Analysis of Obfuscated Smartphone MalwareALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware
ALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware
muhammed jassim k
 
A location-and Diversity aware News feed system for mobile user
A location-and Diversity aware News feed system for mobile userA location-and Diversity aware News feed system for mobile user
A location-and Diversity aware News feed system for mobile user
muhammed jassim k
 
A feature-Enriched Completely Blind image Quality Evaluator
A feature-Enriched Completely Blind image Quality EvaluatorA feature-Enriched Completely Blind image Quality Evaluator
A feature-Enriched Completely Blind image Quality Evaluator
muhammed jassim k
 
Hierarchical supervisory control system for pe vs participating in frequency ...
Hierarchical supervisory control system for pe vs participating in frequency ...Hierarchical supervisory control system for pe vs participating in frequency ...
Hierarchical supervisory control system for pe vs participating in frequency ...
muhammed jassim k
 
On demand retrieval of crowdsourced
On demand retrieval of crowdsourcedOn demand retrieval of crowdsourced
On demand retrieval of crowdsourced
muhammed jassim k
 
Medical warehouse business distribution
Medical warehouse business distributionMedical warehouse business distribution
Medical warehouse business distribution
muhammed jassim k
 
Discoveringlatentsemanticsinweb 160617093617
Discoveringlatentsemanticsinweb 160617093617Discoveringlatentsemanticsinweb 160617093617
Discoveringlatentsemanticsinweb 160617093617
muhammed jassim k
 
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
muhammed jassim k
 

More from muhammed jassim k (20)

Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
Cloud armor:Supporting Reputation-Based Trust Management for Cloud ServiceCloud armor:Supporting Reputation-Based Trust Management for Cloud Service
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
 
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGEELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
 
4.weather based smart watering system using soil sensor and gsm
4.weather based smart watering system using soil sensor and gsm4.weather based smart watering system using soil sensor and gsm
4.weather based smart watering system using soil sensor and gsm
 
26. qo s ranking prediction for cloud services
26. qo s ranking prediction for cloud services26. qo s ranking prediction for cloud services
26. qo s ranking prediction for cloud services
 
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
Energy-Efficient intelligent street lighting system using traffic-adaptive co...Energy-Efficient intelligent street lighting system using traffic-adaptive co...
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
 
Fire col a collaborative protection
Fire col a collaborative protectionFire col a collaborative protection
Fire col a collaborative protection
 
privacy preserving abstract
 privacy preserving abstract privacy preserving abstract
privacy preserving abstract
 
Datamining with big data
 Datamining with big data  Datamining with big data
Datamining with big data
 
33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines
 
An automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networksAn automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networks
 
ALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware
ALTERDROID:Differential fault Analysis of Obfuscated Smartphone MalwareALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware
ALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware
 
A location-and Diversity aware News feed system for mobile user
A location-and Diversity aware News feed system for mobile userA location-and Diversity aware News feed system for mobile user
A location-and Diversity aware News feed system for mobile user
 
A feature-Enriched Completely Blind image Quality Evaluator
A feature-Enriched Completely Blind image Quality EvaluatorA feature-Enriched Completely Blind image Quality Evaluator
A feature-Enriched Completely Blind image Quality Evaluator
 
Hierarchical supervisory control system for pe vs participating in frequency ...
Hierarchical supervisory control system for pe vs participating in frequency ...Hierarchical supervisory control system for pe vs participating in frequency ...
Hierarchical supervisory control system for pe vs participating in frequency ...
 
On demand retrieval of crowdsourced
On demand retrieval of crowdsourcedOn demand retrieval of crowdsourced
On demand retrieval of crowdsourced
 
Medical warehouse business distribution
Medical warehouse business distributionMedical warehouse business distribution
Medical warehouse business distribution
 
Discoveringlatentsemanticsinweb 160617093617
Discoveringlatentsemanticsinweb 160617093617Discoveringlatentsemanticsinweb 160617093617
Discoveringlatentsemanticsinweb 160617093617
 
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
 

Recently uploaded

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 

Recently uploaded (20)

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 

A cloud

  • 1. An Exploration of Geographic Authentication Schemes Abstract We design and explore the usability and security of two geographic authentication schemes: GeoPass and GeoPass-Notes. GeoPass requires users to choose a place on a digital map to authenticate with (a location password). GeoPassNotes—an extension of GeoPass—requires users to annotate their locationpassword with a sequence of words that they can associate with the location(an annotated location password). In GeoPassNotes,users are authenticated by correctly entering both a location andan annotation. We conducted user studies to test the usability and assess the security of location passwords and annotated location passwords. The results indicate that both variants are highly memorable, and that annotated location passwords may be more advantageous than location passwords alone due to their increased security and the minimal usability impact introduced by the annotation. Existing system: In Existing system we use GeoPass, in which a user chooses a single place on a digital map as their password. We perform a multi-session in-lab/at-home user study of GeoPass involving 35 users over 8-9 days. Our results suggest that GeoPass is highly memorable: none of the returning participants forgot their location passwords after one day. Of the 30 participants who returned to login one week later, only one participant failed to enter their password. There were very few failed login attempts throughout the entire study. Our security results suggest that GeoPass provides enough security to protect against online attacks under simple system-enforced policies. GeoPass may also be useful as a building block for future geographic authenticati on systems. Disadvantage : • GeoPass is certainly vulnerable to offline guessing attacks. • Additionally, GeoPass may offer weak security against online guessing attacks in some circumstances (e.g., if it is deployed in a small city or if the
  • 2. adversary had a method of effectively prioritizing guesses). Thus, prudent implementations of GeoPass should find another way to increase security. Proposed system We propose, implement, and evaluate two systems for geographic authentication: GeoPass and GeoPassNotes. We evaluate the systems’ security and usability through two user studies, finding that they both exhibit very strong memorability (over the span of 8-9 days, there were only two resets for GeoPass and none for GeoPassNotes). Usability was high in terms of there being few failed logins and user perceptions of the system. Although 67% of the GeoPass users and 80% of the GeoPassNotes users indicated that they could easily use the system every day, we must be cautious about recommending their use on frequently used accounts. Given that the login times for both systems are longer than text passwords, we suggest they would be most appropriate in contexts where logins occur infrequently. For example, it might be useful for infrequently used online accounts or possibly fallback authentication. We found that annotated location passwords have the potential to be stronger than text passwords against guessing attacks when proper policies are applied, thus they may be more desirable for higher-security environments. Advantages: • The geographic authentication schemes we explored appear to be highly memorable • it would be interesting to explore other ways to harness this memorability while enhancing security. One interesting direction is to explore the extent that the presentation effect can improve security in geographic authentication systems. Another future direction includes exploring whether the memorability of geographic locations might translate if used in mnemonics for text passwords.
  • 3. Hardware Specification : • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech • Ram : 512 Mb. • MOBILE : ANDROID Software Specification : • Operating system : Windows 7. • Coding Language : Java 1.7 • Tool Kit : Android 2.3 ABOVE • IDE : Android Studio