Show simple item record

dc.contributor.advisorKazi, Sadia Hamid
dc.contributor.advisorHossain, Muhammad Iqbal
dc.contributor.authorKaiser, Tamanna
dc.contributor.authorSiddiqua, Rafa
dc.contributor.authorHasan, Md. Main Uddin
dc.date.accessioned2022-11-15T05:00:36Z
dc.date.available2022-11-15T05:00:36Z
dc.date.copyright2022
dc.date.issued2022-05
dc.identifier.otherID 22141060
dc.identifier.otherID 22141064
dc.identifier.otherID 22141049
dc.identifier.urihttp://hdl.handle.net/10361/17566
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2022.en_US
dc.descriptionCataloged from PDF version of thesis.
dc.descriptionIncludes bibliographical references (pages 60-64).
dc.description.abstractMulti-Factor-Authentication is one of the most used services nowadays by all kinds of people, especially by many organizations. People use this service to authorize their stored data and to access it without any security disturbance. As the use of different storage systems for various types of data is increasing, we need to focus on security. Any kind of security threat can be a great threat to any company. While checking the most recent surveys of different security issues we find that 94% of organizations are moderate to extremely concerned about data security. According to research from Intel, insider threats are responsible for an incredible 43 percent of all breaches. Half are intentional and half are accidental. [62][42] In this paper, we are proposing a fully secure data flow for data security with data encryption, IAM, IDAAS, AAAS, MFA, and SAML to prevent unauthorized data access and insecure data storage. With these models, we can control access and authorization to secure both data storage and stored data access. Here, this system focuses on secure authentication, authorization, and access data control by using a multi-layer security system. In this multi-layer security system, there will be Multi-Factor-Authentication along with Two-Factor-Authentication via email or phone. To ensure security, this system has a key-exchange system where the primary key and secondary key will be generated as a One-Time-Password for super admin and co-admin. Then the system will check the OTP in the Key Exchange process. In the future, the system will also be adding biometric authentication in this system for the co-admins. There will be two biometric options which are Irish Scanner and Fingerprint so that we can ensure the high-level authentication security for this system.en_US
dc.description.statementofresponsibilityTamanna Kaiser
dc.description.statementofresponsibilityRafa Siddiqua
dc.description.statementofresponsibilityMd. Main Uddin Hasan
dc.format.extent64 pages
dc.language.isoenen_US
dc.publisherBrac Universityen_US
dc.rightsBrac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectTFAen_US
dc.subjectMFAen_US
dc.subjectReal-time computingen_US
dc.subjectMulti-layered security systemen_US
dc.subjectKey-exchangeen_US
dc.subjectKSU key exchangeen_US
dc.subjectSession timeouten_US
dc.subjectBio-metric Super-adminen_US
dc.subjectCoadminen_US
dc.subjectVerificationen_US
dc.subjectPrimary serveren_US
dc.subjectBackup serveren_US
dc.subjectData serveren_US
dc.subject.lcshComputer Security
dc.subject.lcshApplication software development
dc.titleA multi-layer security system for data access control, authentication, and authorizationen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, Brac University
dc.description.degreeB. Computer Science and Engineering


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record