Open Access Open Access  Restricted Access Subscription or Fee Access

An Improved Authentication Security Scheme

Nidhi Sharma, V.K. Srivastava, Alok Sharma



With the emergence of big data and cloud computing, user authentication becomes more and more difficult as password security is a major issue for any authenticating process. Password plays an important role in various applications like internet services, net banking, ATM machines etc. But passwords are not much safe to provide the security to the users because of large no. of attacks. Different researches in past have proposed different techniques to make the passwords most secured. In this paper, a new technique is proposed which involves three steps: salting, hashing, and then generating a masked list. This masked list is stored in the user’s password file. If any intruder attempts to log in using any of these masked list words then an alarm is raised for the application and the application can block that user or address.


Keywords: Big data, cloud computing, salting, hashing, masked list, passwords security, honeywords

Cite this Article

Nidhi Sharma, V.K. Srivastava, Alok Sharma. An Improved Authentication Security Scheme. Journal of Advancements in Robotics. 2017; 4(3): 10–13p.

Full Text:



  • There are currently no refbacks.

This site has been shifted to