European Journal of Computer Science and Information Technology (EJCSIT)

EA Journals

Authentication

Modern Cloud Security & Infrastructure: Embracing Zero Trust, Multi-Cloud, and Infrastructure as Code (Published)

This article explores an integrated framework for modern cloud security and infrastructure management, addressing the complex challenges organizations face in today’s rapidly evolving digital landscape. By examining three key trends—Zero Trust Security, Multi-Cloud/Hybrid Cloud approaches, and Infrastructure as Code—the article illuminates how these complementary strategies collectively transform enterprise technology management. Zero Trust Security redefines perimeter defense by implementing continuous verification across all access attempts, while Multi-Cloud and Hybrid Cloud architectures provide strategic flexibility through diversified deployment models. Infrastructure as Code revolutionizes provisioning processes by treating infrastructure configurations as software artifacts, enabling automation and consistency. When implemented together, these approaches create a unified cloud strategy that is secure by design, operationally efficient, and strategically adaptable. Through practical examples across various industries, the article demonstrates how this integrated approach enables organizations to build resilient cloud environments that balance robust security with business agility.

Keywords: Authentication, Automation, Compliance, microservices, orchestration

Development of QR Code-Based Authentication System for Admitting Students into Examination Hall for Polytechnics in Nigeria (Published)

This study implements a QR code-based authentication system at Federal Polytechnic Ukana, Nigeria, as a technological solution to the challenges of traditional manual verification methods in examination management. The system architecture includes a database management module (MySQL), a QR code generation module (Python QR Code library), and an authentication module (Android mobile application). The system integrates web-based and mobile platforms, enhancing accessibility and usability. Advanced Encryption Standard (AES) is used to secure QR code data. The system undergoes rigorous testing to validate its functionality, accuracy, and security. A pilot deployment in two departments over a two-week examination period showed improved efficiency, reduced impersonation cases, and enhanced overall examination integrity. Performance metrics showed reduced verification time, increased accuracy, and system reliability under varying conditions. The findings confirm that QR code technology significantly enhances examination security and operational efficiency. However, challenges such as internet connectivity dependency and potential QR code tampering are acknowledged. Future research may explore the integration of biometric authentication and blockchain technology to strengthen security measures. The successful implementation at Federal Polytechnic Ukana provides a model for broader adoption, offering a scalable and cost-effective solution to modernize examination management across Nigerian polytechnics and beyond.

Keywords: Authentication, Examination, Polytechnic, QR-Code, random forest extreme gradient boosting

3D Shapes Technique to Improve Mail Services Authentication (Published)

In today’s world, security is important aspect in day to day life .So, everyone used various ways for security purpose. users use passwords for their mail security and Generally, everyone uses textual password. Textual password is combination of alphabets, characters and numbers. users keep textual password as name of their favorite things, actors or actress, dish and meaningful word from dictionary. But the person who is very close to that person can easily guess the password. Graphical password is advanced version of password. Graphical passwords have received considerable attention lately as Potential alternatives to text-based passwords .Graphical password is composed of images, parts of images, or sketches. These passwords are very easy to use and remember. To Drawbacks of previously existing authentication techniques. We present A new improved authentication technique. The proposed system is about a new technique to generate password; there are three password fields each field is about one character and one number, when the user fill the three fields the system security generate a special algorithm which is available in the user’s machine itself to convert the content of the three password’s fields to a 3D graphical shape which are saved and transfer in the form of 3D shape in server side . so all the password have been stored in the form of 3D shape at the server . so anybody want to hack password he will face difficulty to guess the exact password because he can see only the shape not real password ( the three pairs of characters and numbers) .

Keywords: 3D Shape, Authentication, Mail Service, Processing 2.0 mode P3D Technique.

Three – Level Password Authentication (Published)

Authentication is one of the most important security service provided to system by the different authentication schemes or algorithms which must be provided so that only authorized persons can have right to use or handle that system and data related to that information system securely. Techniques used include token based, biometric based as well as knowledge based. Despite these, no single mechanism is efficient and effective to provide adequate security for computing resources such as programs, files, messages, printers, internet, etc. A 3 – level authentication is proposed in this paper that is more confidential for ensuring adequate security.

Keywords: Authentication, Authentication Techniques, Information Systems, Security

3CAuth – A Novel Multi-Factor Authentication Scheme using QR-Code (Review Completed - Accepted)

A multi-factor authentication scheme for remote authentication has been proposed in the paper which provides enough protection on personal credentials of the user. A critical analysis of the scheme shows that it can resist most of the possible attacks and is particularly useful at times of peak loads on servers. The scheme can easily integrate intoany framework offering Internet services to add security guarantee. The same has been brought out by integration with a multi-layered framework designed to handle peak loads on the server ensuring concurrency and availability as well. This integration is seen to clearly enhance the QoS in terms of making right admittance to right resources.

Keywords: 3CAuth, Authentication, Multi-layered Filtering, Multiphase admission control, Peak load, QR-Code, Security, Smart-card

Scroll to Top

Don't miss any Call For Paper update from EA Journals

Fill up the form below and get notified everytime we call for new submissions for our journals.