Hybrid Scheme: Two Factor Authentication using Graphical password with Pass point scheme in Cloud computing
Journal Title: Scholars Journal of Engineering and Technology - Year 2013, Vol 1, Issue 4
Abstract
Cloud Computing is a completely new concept in the research area. Cloud computing focuses new challenging security threat. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. We proposed a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. Therefore, our authentication security scheme must solve the most security challenges of cloud computing.
Authors and Affiliations
Harmeet Kaur, Dr. RK Bansal
A Linear Programming Model of Multi-class Support Vector Machine
The structure of K-SVCR algorithm is ‘one-against-one-against-rest’.Its advantage is in the process of each decomposition , make all training points of information have been fully taken advantage of. To a certain extent...
Aragonite Precipitated Calcium Carbonate – Filler for Light Weight Plastics
A new kind of functional filler, aragonite precipitated calcium carbonate (PCC) which has a specific needle shaped morphology and is prepared from natural limestone is of high industrial importance and is an eco-friendl...
Scrambled Audio Frequency Signal Transmission in a 3-slot STBC Scheme Based SC-FDMA Wireless Communication System
Space time block coding (STBC), an effective and efficient transmit diversity scheme implemented Multi-input multi-output (MIMO) wireless communication systems have well been accepted as robust and efficient to combat d...
Research on Innovating the Training Practice Path of New Professional Farmers: Taking Heilongjiang Province as an Example
The new professional farmer is the hard core to promote the transformation of Heilongjiang Province from the big agricultural province to the strong agricultural province. The practice path of innovating the training of...
Data Mining in the Application of Criminal Cases Based on Decision Tree
A briefing on data mining technology used in criminal investigation work and the importance of using ID3 decision tree to structure the Decision Tree algorithm method is given by this paper. It makes a combination of cri...