GRAPHICAL IMAGE AS AUTHENTICATION APPROACH IN CLOUD COMPUTING

Abstract

 Graphical password is easy to remember as compared to alphanumerical password. Users tend to pick passwords that can be easily guessed. In case, if user choose hard then it is difficult to remember. Graphical password schemes is a possible alternative to text-based schemes, motivated partially by the fact that humans can remember pictures better than text. We have proposed cloud with graphical security by means of image password. We are using one of the algorithm which is use user name and images as a password. We are trying to give set of images by using position of alphabet character in user name and cloud is provide secure graphical password authentication.

Authors and Affiliations

Komal More

Keywords

Related Articles

 BLOOD PHYSIOLOGICAL CHANGES OF COMMON CARP CYPRINUS CARPIO IN SUMMER AND WINTER SEASON IN THE CITY OF BAGHDAD-IRAQ

 In this work was to verify the existence of the effect of temperature difference on some blood parameters of Common Carp. The results showed follows: There were no significant differences (p>0, 05) in HB and PC...

 Performance Analysis of Two Stroke SI Engine with Methanol Blending

 Use of automobiles are increasing day by day. Alternative fuels for IC engines are also becoming important because of diminishing gasoline reserves and increasing air pollution. Methanol and Ethanol are good commo...

 THE DISCREPANCY OF THE STUDENTS’ MATHS ACHIEVEMENT BASED ONTHE COMBINATION OF COOPERATIVE LEARNING MODEL, STUDENTS’CHARACTERS BEHAVIOUR, AND EDUCATION LEVEL (EXPERIMENTALSTUDY ON THE STUDENTS OF SENIOR AND JUNIOR HIGH SCHOOLS INKENDARI

 This 3x3x2 factorial-designed experimental study aims at analysing the discrepancy of students’ Mathsachievement based on the combination of cooperative learning model (Jigsaw-STAD, TSTS-STAD and STAD),the students...

 DESIGN AND DEVELOPMENT OF BILIRAN PROVINCE OFFICIAL WEBSITE

 The Biliran Province Official Website is a web system or a social networking site which was designed to be a source of increase in tourism through online advertising but not limited only on information sharing...

ANALISYS BENFORD LAW FOR COMPANY EVIDANCE FROM INDONESIA

This study aims to see how the auditors in accounting and IT must apply to the various procedures in the audit of financial statements with IT-assisted. When viewed as a whole all the computer-assisted audit tools (CAAT...

Download PDF file
  • EP ID EP100945
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

Komal More (0).  GRAPHICAL IMAGE AS AUTHENTICATION APPROACH IN CLOUD COMPUTING. International Journal of Engineering Sciences & Research Technology, 4(10), 426-432. https://europub.co.uk/articles/-A-100945