A Study on Performance Evaluation of 7-Step QRcode Authentication Framework

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 164)


This thesis designed QRcode authentication framework with 7 steps, and especially proposed ‘Stepwise Dimensional Ascending Algorithm’. The stepwise dimensional ascending algorithm for QRcode authentication framework is described as follows: in step 1, space filling curve algorithm making one dimensional sequence and neighboring cells are bound together; in step 2, a two dimensional array is comprised; and in step 3 is ‘Layer’ work processed. In other words, three-dimensional sequence is made by Z-Order. In order to perform comparison analysis on the currently used authentication systems and the proposed one, each authentication technique on the Android OS environment was implemented for a test. The test result showed that just as the original study purpose of QRocde authentication system, the proposed technique made mobile devices less consume system resources, and that, regarding network traffic volume between mobile devices and a server and the time necessary for authentication in a server, the proposed technique’s performance is as same as or better than encryption method and mobile OTP method.


QRcode Mobile cloud Authentication 


  1. 1.
    Gho, H., Im, H., Lee, J.: Policy to facilitate cloud computing based smart mobile office. 2010 J. Electr. Eng. Inf. Sci. 37(2), 2449–2455 (2010)Google Scholar
  2. 2.
    Eun, S.: Trend of cloud computing security technology. J. Inf. Secur. Encryptol. 20, 27–31 (2010)Google Scholar
  3. 3.
    Oh, D.-S., Kim, B.-H., Lee J.-K.: A study on authentication system using QR code for mobile cloud computing environment. FutureTech 2011, Part I, CCIS 184, pp. 500–507 (2011)Google Scholar
  4. 4.
    Ju, S.H., Seo, H.S.: Password based user authentication methodology using multi-input on touch environment. J. Korea Soc. Simul. 20(1), 39–49 (2011)Google Scholar
  5. 5.
    Cho, D., Yoo, J., Hong, B.: Object and cell clustering algorithm of fixed grid file. J. Electr. Eng. Inf. Sci. Datab. 28(1), 503–509 (2001)Google Scholar
  6. 6.
    Zhao, H., Li, X.: S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme. Proceedings of the 21st IEEE International Conference on Advanced Information Networking and Applications Workshops, vol. 2, pp. 467–472 (2007)Google Scholar
  7. 7.
    Cho, D., Yoo, J., Hong, B.: Object and cell clustering algorithm of fixed grid file. J. Electr. Eng. Inf. Sci. Datab. 28(1), 69–85 (2001)Google Scholar
  8. 8.
    Jin, D., Jang, J.: Cell based clustering scheme for massive data in datamining. J. Electr. Eng. Inf. Sci. Datab. 28(4), 2915–2922 (2001)Google Scholar
  9. 9.
    Orenstein J.A.: Spatial query processing in an object-oriented database system. ACM SIGMOD Conference, pp. 326–336 (1986)Google Scholar
  10. 10.
    Morton, G.M.: A Computer oriented geodetic database and a new technique in file sequencing. IBM Ltd., Ottawa, Canada (1966)Google Scholar

Copyright information

© Springer Science+Business Media Dortdrecht 2012

Authors and Affiliations

  1. 1.Department of Computer EngineeringHannam UniversityDaejeonKorea
  2. 2.Department of Computer and Information EngineeringCheongju UniversityCheongjuKorea

Personalised recommendations