📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 6, ISSUE 12, DECEMBER 2017

Ensuring Efficiency of Authentication by Providing Redundant Authentication by using Dynamic Password Methods using BCrypt Algorithm in VPN Access

Dr. S. Yamini, M. Anbunesan

DOI: 10.17148/IJARCCE.2017.61221

Abstract: As networks become borderless in modular times, the accessibility of networks are also increasing in proportionate to its growth. Enterprises have employees and partners who often needed to access their corporate resources from their respective remote location keeping in mind about the confidentiality, integrity and availability of the data throughout the whole access phrases. Borderless networks encourage and promote the growth of secured remote access to corporate resources to their remote employees and partners. In modeler times out of several remotes access methods, VPN is one of the most used methods that provide C.I.A (confidentiality, integrity, availability) factors. Traditional VPNs supports the C.I.A factor with the help of only predefined authentications, possibly in certain cases linked with third party authorized authentication servers. In this work it has been proposed to use VPN in traditional way but added with an extra Layer of authentication name called 2 step authentications which involves the use of dynamically generated OTP/OTAC with Bcrypt Algorithm. The remote user/partner needs to pan the traditional authentication along with the 2nd step verification before the private access is granted to him/her.



Keywords: C.I.A - Confidentiality, Integrity, and Availability, , VPN, OTP/OTAC

How to Cite:

[1] Dr. S. Yamini, M. Anbunesan, “Ensuring Efficiency of Authentication by Providing Redundant Authentication by using Dynamic Password Methods using BCrypt Algorithm in VPN Access,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2017.61221