Three-Tier Password Security Algorithm for Online Databases

被引:0
作者
Zaland, Zubair [1 ]
Bazai, Sibghat Ullah [2 ]
Marjan, Shah [1 ]
Ashraf, Muhammad [1 ]
机构
[1] BUITEMS, Dept Software Engn, Quetta, Pakistan
[2] BUITEMS, Dept Comp Engn, Quetta, Pakistan
来源
2ND INTERNATIONAL INFORMATICS AND SOFTWARE ENGINEERING CONFERENCE (IISEC) | 2021年
关键词
SQLi; SQL injection; Password Security; Salt; Hashing; Encryption; authentication; ATTACKS;
D O I
10.1109/IISEC54230.2021.9672434
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Password security is a significant issue for any authenticating process, and different researchers in the past have proposed techniques such as hashing, salting, honeywords to make the process most secured. We provide a self-guaranteed secure program and its access methods to mitigate the risk of illegal attacks like DDoS. This method ensures the security of a program by giving method level security that bolsters the further implemented security measures. A step-up approach is implementing the access security measures that protect against SQL injection and script attacks. Lucubration of various papers suggests that most systems are compromised at the storage of login credentials. Our solution ensures the security of such measures by obscurity. By using multiple layers of additional security procedures before storing the data decreases the risk of break-in exponentially. Our attempt to securely store passwords includes salting the passwords, encrypting them, and finally hashing them so that no patterns are visible. This paper presents a new method that involves SQLi prevention, encrypting, salting and then hashing the password. The SALT is generated dynamically using two parameters, one of which is unique, and the Salt is not stored in the database.
引用
收藏
页数:6
相关论文
共 18 条
  • [1] [Anonymous], 2017, INT C APPL TECHNIQUE
  • [2] [Anonymous], PASSWORD GUESSING BR
  • [3] [Anonymous], WHAT IS BRUTE FORCE
  • [4] [Anonymous], WHAT ARE BEST PHP IN
  • [5] SparkDA: RDD-Based High-Performance Data Anonymization Technique for Spark Platform
    Bazai, Sibghat Ullah
    Jang-Jaccard, Julian
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 646 - 662
  • [6] Churi P., 2014, INT J COMPUTER APPL, V92
  • [7] Achieving Flatness: Selecting the Honeywords from Existing User Passwords
    Erguler, Imran
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) : 284 - 295
  • [8] Combinatorial Approach for Preventing SQL Injection Attacks
    Ezumalai, R.
    Aghila, G.
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1212 - 1217
  • [9] Fredj O.B., 2020, PROC INT C RISKS SEC, P235
  • [10] Gao Jiao, 2012, 2012 International Conference on Computer Science and Service System (CSSS), P1178, DOI 10.1109/CSSS.2012.298