The document discusses a project that aims to provide high security for users through a multilayer authentication system using local, network, and cloud systems on GPU-enabled devices. It involves multiple sub-projects and sub-modules that interact and connect with each other for computing and managing. The project will survey research papers, websites, technical conferences, journals, and personal experience to gather information on authentication techniques like passwords, gestures, biometrics and more. It outlines a timeline for the project over two semesters, including publishing research papers and tracking daily progress. Suggestions and feedback are requested.
4. PURPOSE
Purpose of a Project
AGENDA
Provide High Security
to user by using
multilayer authentication system
in local , Network & Cloud
Systems On
GPU enabled Devices
6. SURVEY
Survey of Research Material
AGENDA
Research Papers
Research Websites
Technical Conferences
Technical Forums
International Journals
Project Guide
Personal Experience
Imagination & Hypothesis
7. Timeline & Grant Chart
AGENDA
Project Work flow
throughout 1st & 2nd semester
With Process modules
& planning of
publishing research Papers
as well as
day by day project
progress tracking
TIMELINE
11. “What You Know” Knowledge
“What You Have” Hard/Soft
“What You Are" Biometric
"What You Can " Intelligence
"What You Recognize" Recognition
HUMAN
AUTH
TECHNIQUES
15. * BODY PRINT *
* RETINAL PATTERN *
* DNA SEQUENCE *
* FACE*
* VOICE *
* EYE *
* PALM & THUMB *
16. * ARTIFICIAL INTELLIGENCE ANSWERS *
* MEMORY INTELIGENCE *
* COMPLEX SOLUTIONS *
* CHALLENGE RESPONSE *
* CALL UP *
* THINK BACK SYSTEM WORKING*
17. * OBJECT *
* IMAGE*
* PATTERN *
* PATH / WAY *
* SOUND / AUDEO *
* ANIMATION / VIDEO *
* SYSTEM *
18.
19. Computer Security
Prevention and Detection of unauthorized actions by users
For What..??
* Confidentiality *
* Availability *
* Non-repudiation *
* Accountability *
* Security systems *
20.
21. The Platforms for which Security will provide
Mostly Web Applications & web Sites
AS
* Forums*
* Social Networking*
* Search Engines*
* Cloud Applications*
* Server Applications Systems*
* Mailing & Messaging *
22.
23. Survey for MARUTI requires different
survey Material
AS
* Research Papers & Websites *
* Technical Conferences & Forums*
* International Journals *
* Project Guide*
* Personal Experience *
* Imagination & Hypothesis *
24. Survey for Human Identification System
AS
* Research Papers & Websites *
* Technical Conferences & Forums*
* International Journals *
* Project Guide*
* Personal Experience *
* Imagination & Hypothesis *
25. * Distinguishing between Humans and Robots on the Web
* Roles in information security : A survey and classification of the research area
* Safeguards and security survey and self-assessment toolkit
* Building Robust Authentication Systems With Activity-Based Personal Questions
* Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs
* Modeling Human Behavior for Defense against Flash-Crowd Attacks
* Cyber Security Using Arabic CAPTCHA Scheme
* Distinguishing Humans from Bots in Web Search Logs
* Some thoughts about writing a survey paper
28. Project Guide
Dr. R. C. Thool
Personal Experience
Crawling Through Web/Papers/Books/Guide
Imagination & Hypothesis
Increase in secureness in user authentication system with high
performance & User friendly
29.
30. December JanuaryNovember February
Trial & error for
Paper design
Planning For
different
Conferences
Tracking
Optimize
results
Testing
Planning for
GTC 2013
Result Merging
of all Systems
Publish / reedit
Paper
Compare
Papers & results
2nd
Presentation
33. The Ideas Creation about user authenticating Schemes
AS
* Merging of different authentication Schemes*
* Overlapping authentication systems *
* Use of GPU to improve performance as GPGPU*
* Creation of Scheme Environment using Parallelism*
* Achieve parallelism using CUDA/OpenCL*
* Optimize use of available Hardware*
“What You Know” Knowledge“What You Have” Hard/Soft piece“What You Are" Biometric"What You Can " Intelligence"What You Recall" Recognition
Transition effect for timeline, slide 2(Basic)Tip: This slide is the second slide in a three-slide sequence.To reproduce the effects on this slide, do the following:In the Slides and Outline pane, right-click the previous slide (“Transition effect for timeline, slide 1”) and click Duplicate Slide.Select each of the three text boxes on the slide and change the text.Select the chevron shape on the slide. Drag the left sizing handle to the left so that the chevron shape extends past the left edge of the slide.
Transition effect for timeline, slide 3(Basic)Tip: This slide is the second slide in a three-slide sequence.To reproduce the effects on this slide, do the following:In the Slides and Outline pane, right-click the previous slide (“Transition effect for timeline, slide 2”) and click Duplicate Slide.Select each of the three text boxes on the slide and change the text.Select the chevron shape on the slide. Drag the right sizing handle to the left so that the right edge of the chevron shape is 0.5” from the right edge of the slide.