M 3HP: An Efficient Secured Data Transmission using the Human Password Generation Solution
Amarnath J L1, Pritam Gajakumar Shah2

1Amarnath J L, Assistant  professor, Department of Computer  Engineering, Research scholar at Vishveswaraya Technological University Belagavi,  India.

2Pritam Gajakumar Shah, Chief Editor Australian journal of  wireless technology mobility and security Canberra Australia, University of  Canberra. 

Manuscript received on 09 August 2019 | Revised Manuscript received on 16 August 2019 | Manuscript Published on 31 August 2019 | PP: 152-158 | Volume-8 Issue-9S2 August 2019 | Retrieval Number: I11780789S219/19©BEIESP DOI: 10.35940/ijitee.I1178.0789S219

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: One of the most important and essential tasks in all kinds of online information transmission system is security. In recent days mutual authentication and authorization are used for secured communication and data transmission. Most of the public and private networks are insecure networks. Various existing researchers proposed various secured protocols using various key cryptographic methods, whereas the computational, time and cost, complexity is more and utilize more memory space. Hence, the existing security protocols cannot be used as fast and efficient internet-based applications. To overcome the above-said issues, this paper proposed a Multi-Stage Multi-Model Human Password (MMMHP-M3HP) generation framework to provide a highly secured data transmission in online applications. The M3HP framework generates a human password is by combining various data models like numerical, alphabets, alpha-numerical and images for authorizing the end users in various stages of the applications. This is so-called Multi-stage and Multi-Model security. Each time user enters into the application, the password is regenerated and cross verified to increase the security level.

Keywords: Human Password Generation, Security in Cloud, Data security, Multi-level security, Authentication, Authorization
Scope of the Article: Authentication, Authorization, Accounting