GRAPHICAL IMAGE AS AUTHENTICATION APPROACH IN CLOUD COMPUTING

Abstract

 Graphical password is easy to remember as compared to alphanumerical password. Users tend to pick passwords that can be easily guessed. In case, if user choose hard then it is difficult to remember. Graphical password schemes is a possible alternative to text-based schemes, motivated partially by the fact that humans can remember pictures better than text. We have proposed cloud with graphical security by means of image password. We are using one of the algorithm which is use user name and images as a password. We are trying to give set of images by using position of alphabet character in user name and cloud is provide secure graphical password authentication.

Authors and Affiliations

Komal More

Keywords

Related Articles

ANALYSIS AND SECURITY TESTING OF ANDROID SYSTEM BY MALWARE DETECTION IN NETWORKS

The same principles that organizations use to monitor network traffic go into their networks must be applied to the network traffic originating from mobile devices. This means that the techniques and tools, which would...

 Implementation of Command Transfer Protocol for Cluster in Networking

 Computational cluster is used for heavy computation that emphasizes various requirements for network functionality. Most of the computing software uses TCP/IP for their computation. But it has lot of disadvantages...

POWER QUALITY IMPROVEMENT AND INTERFACING OF WIND ENERGY SOURCE

Current condition customer electrical power demand is more but electrical power generation is not more. In this case use renewable energy sources for electrical power generation. In this paper renewable energy source...

 AT-A-STATION HYDRAULIC GEOMETRY OF TARALI RIVER, MAHARASHTRA: AN IMPACT OF HUMAN INTERVENTION ON CHANNEL

 The section of Tarali channel for about 4.325 km in direction upstream from its confluence with River Krishna has been studied through field survey carried out in 7 sessions for the present research work. Of the 9...

 A Comprehensive Survey on Various ICIC Schemes and Proposed 3G RF Interference Mitigation Techniques for OFDM Downlink on Cellular Networks

 Inter Cell Interference (ICI) still poses a real challenge that limits the Orthogonal Frequency Division Multiplexing Access (OFDMA) system performance, especially for users located at the cell edge. A common Inte...

Download PDF file
  • EP ID EP100945
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

Komal More (0).  GRAPHICAL IMAGE AS AUTHENTICATION APPROACH IN CLOUD COMPUTING. International Journal of Engineering Sciences & Research Technology, 4(10), 426-432. https://europub.co.uk/articles/-A-100945