dc.contributor.advisor | Kazi, Sadia Hamid | |
dc.contributor.advisor | Hossain, Muhammad Iqbal | |
dc.contributor.author | Kaiser, Tamanna | |
dc.contributor.author | Siddiqua, Rafa | |
dc.contributor.author | Hasan, Md. Main Uddin | |
dc.date.accessioned | 2022-11-15T05:00:36Z | |
dc.date.available | 2022-11-15T05:00:36Z | |
dc.date.copyright | 2022 | |
dc.date.issued | 2022-05 | |
dc.identifier.other | ID 22141060 | |
dc.identifier.other | ID 22141064 | |
dc.identifier.other | ID 22141049 | |
dc.identifier.uri | http://hdl.handle.net/10361/17566 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2022. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 60-64). | |
dc.description.abstract | Multi-Factor-Authentication is one of the most used services nowadays by all kinds
of people, especially by many organizations. People use this service to authorize
their stored data and to access it without any security disturbance. As the use of
different storage systems for various types of data is increasing, we need to focus on
security. Any kind of security threat can be a great threat to any company. While
checking the most recent surveys of different security issues we find that 94% of
organizations are moderate to extremely concerned about data security. According
to research from Intel, insider threats are responsible for an incredible 43 percent of
all breaches. Half are intentional and half are accidental. [62][42] In this paper, we
are proposing a fully secure data flow for data security with data encryption, IAM,
IDAAS, AAAS, MFA, and SAML to prevent unauthorized data access and insecure
data storage. With these models, we can control access and authorization to secure
both data storage and stored data access.
Here, this system focuses on secure authentication, authorization, and access data
control by using a multi-layer security system. In this multi-layer security system,
there will be Multi-Factor-Authentication along with Two-Factor-Authentication via
email or phone. To ensure security, this system has a key-exchange system where the
primary key and secondary key will be generated as a One-Time-Password for super
admin and co-admin. Then the system will check the OTP in the Key Exchange
process. In the future, the system will also be adding biometric authentication in
this system for the co-admins. There will be two biometric options which are Irish
Scanner and Fingerprint so that we can ensure the high-level authentication security
for this system. | en_US |
dc.description.statementofresponsibility | Tamanna Kaiser | |
dc.description.statementofresponsibility | Rafa Siddiqua | |
dc.description.statementofresponsibility | Md. Main Uddin Hasan | |
dc.format.extent | 64 pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | TFA | en_US |
dc.subject | MFA | en_US |
dc.subject | Real-time computing | en_US |
dc.subject | Multi-layered security system | en_US |
dc.subject | Key-exchange | en_US |
dc.subject | KSU key exchange | en_US |
dc.subject | Session timeout | en_US |
dc.subject | Bio-metric Super-admin | en_US |
dc.subject | Coadmin | en_US |
dc.subject | Verification | en_US |
dc.subject | Primary server | en_US |
dc.subject | Backup server | en_US |
dc.subject | Data server | en_US |
dc.subject.lcsh | Computer Security | |
dc.subject.lcsh | Application software development | |
dc.title | A multi-layer security system for data access control, authentication, and authorization | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B. Computer Science and Engineering | |