hem first presentation

42

Upload: hemprasad-badgujar

Post on 18-Jul-2015

83 views

Category:

Technology


0 download

TRANSCRIPT

INTRO

Introduction

PROJECT AGENDA

Explanation

about project with sub projects

as well as

sub modules with their

interaction & interconnections

with each other for

computing & managing

PURPOSE

Purpose of a Project

PROJECT AGENDA

Provide High Security

to user by using

multilayer authentication system

in local , Network & Cloud

Systems On

GPU enabled Devices

PLATFORM

Platform & Environment

PROJECT AGENDA

Platform as computer system

with HPC capability with help of

GPUs

Need of Smart I/O Devices ,

Smart Devices for Interaction

SURVEY

Survey of Research Material

PROJECT AGENDA

Research Papers

Research Websites

Technical Conferences

Technical Forums

International Journals

Project Guide

Personal Experience

Imagination & Hypothesis

Timeline & Grant Chart

PROJECT AGENDA

Project Work flow

throughout 1st & 2nd semester

With Process modules

& planning of

publishing research Papers

as well as

day by day project

progress tracking

TIMELINE

Results & Charts

PROJECT AGENDA

Obtaining results

• Security

• Optimization

• User Interface

• Usability

• Compare Past Authentication

RESULTS

Any Suggestions

PROJECT AGENDA

Waiting For

• Suggestions

• Guidance

• Questions

• Queries

Any else …!!

ANY

“What You Know” Knowledge

“What You Have” Hard/Soft

“What You Are" Biometric

"What You Can " Intelligence

"What You Recognize" Recognition

HUMAN AUTH

TECHNIQUES

* PASSWORD ** GESTURE *

* PATH ** CHALLENGE RESPONSE *

* TOKENS ** PASS PHRASE *

* PIN *

* WRIST BAND ** ID CARD *

* SECURITY TOKEN ** CHALLENGE RESPONSE *

* CELL PHONE ** PHONE *

* SMART DEVICES *

* BODY PRINT ** RETINAL PATTERN *

* DNA SEQUENCE ** FACE*

* VOICE ** EYE *

* PALM & THUMB *

* ARTIFICIAL INTELLIGENCE ANSWERS ** MEMORY INTELIGENCE ** COMPLEX SOLUTIONS *

* CHALLENGE RESPONSE ** CALL UP *

* THINK BACK SYSTEM WORKING*

* OBJECT ** IMAGE*

* PATTERN ** PATH / WAY *

* SOUND / AUDEO ** ANIMATION / VIDEO *

* SYSTEM *

Computer SecurityPrevention and Detection of unauthorized actions by users

For What..??* Confidentiality *

* Availability ** Non-repudiation ** Authentication ** Access Controls ** Accountability *

* Security systems *

The Platforms for which Security will provideMostly Systems Which Includes GPU systems

AS* Smart Portable Devices *

* Computer Systems ** High End Workstations ** Cloud Virtual Systems *

* Server Systems** Super Computers *

* Mobile Phones ** Tablets ** Netbooks ** Palmtops ** Laptops ** Gaming Consoles *

* Mali GPU 400/T678 ** Tegra 2/3/4 ** NVIDIA GF GTX M ** AMD Radeon HD ** NVIDIA GF GT M ** RSX NVIDIA G70*

* Computers ** Workstations ** Research Systems *

* NVIDIA GF GTX ** AMD Radeon HD ** NVIDIA GF GT M ** NVIDIA Quadro 6000** Quadro Plex 7000** AMD FirePro** NVIDIA Quadro 6000*

* Server Systems ** Virtual Systems ** Super Computers *

* NVIDIA GF GTX ** AMD FireStream™ 9250** NVIDIA TESLA K10** NVIDIA TESLA M2090** AMD FirePro*

Survey for MSPUAS requires different survey Material

AS* Research Papers & Websites *

* Technical Conferences & Forums** International Journals *

* Project Guide** Personal Experience *

* Imagination & Hypothesis *

* A Novel 3D Graphical Password Schema* Technical Conferences & Forums** Authentication for Distributed Systems** Designing Authentication Systems with Challenge Questions** Building Robust Authentication Systems With Activity-Based Personal Questions** Three-Dimensional Password for More Secure Authentication** Artificial Intelligence Based Mutual Authentication Technique with Four Entities ** Artificial Intelligence Based Authentication Scheme for Mobile Adhoc Networks** An Improvement on a Three-party Password-based Key Exchange Protocol** Novel Artificial Intelligent Based Message Authentication Technique in Mobile* Robust security system based On dynamic signature Authenticated peer group key Exchange* Enhancing security and privacy in biometrics-based authentication systems** A High Performance Image Authentication Algorithm on GPU with CUDA** User Authentication using Rhythm Click Characteristics for Non-Keyboard Devices** New Directions in Cryptography*

Project Website

hardsoft.teamlab.com

GPUSCIENCE

NVIDIABLOG

SEARCHSECURITY

HEMBLOG

Project GuideDr. R. C. Thool

Personal ExperienceCrawling Through Web/Papers/Books/Guide

Imagination & HypothesisIncrease in secureness in user authentication system with high

performance & User friendly

September OctoberAugust

Working For Project

Platform1st

Presentation

Collections & survey of

research papers

Finalize project base papers

Planning to future steps

December JanuaryNovember February

Trial & error for Paper design

Planning For different

Conferences

Tracking Optimize

results Testing

Planning for GTC 2013

Result Merging of all Systems

Publish / reeditPaper

Compare Papers & results

MayAprilMarch June

Future Planning

Final Transaction with paper

Combined Result

FINAL Presentation

Finalize results with

Optimization

The Ideas Creation about user authenticating SchemesAS

* Merging of different authentication Schemes** Overlapping authentication systems ** Use of GPU to improve performance as GPGPU** Creation of Scheme Environment using Parallelism** Achieve parallelism using CUDA/OpenCL** Optimize use of available Hardwares*

Sub Research Papers by me to help final paper AS

* Building AI Systems for Person Authentication Accelerate Using GPU** Virtual environment for use authentication Accelerate Using GPU ** GPU Accelerated Multicrypto encryption on data fragment** Creation of Scheme Environment using Parallelism** Multifactor Biometric authentication by GPU computing** System crawling for future authentication Queries*

Waiting ForSuggestions …!!Guidance …!!Questions …!!Queries …!!Any else …!!