GRAPHICAL IMAGE AS AUTHENTICATION APPROACH IN CLOUD COMPUTING
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 10
Abstract
Graphical password is easy to remember as compared to alphanumerical password. Users tend to pick passwords that can be easily guessed. In case, if user choose hard then it is difficult to remember. Graphical password schemes is a possible alternative to text-based schemes, motivated partially by the fact that humans can remember pictures better than text. We have proposed cloud with graphical security by means of image password. We are using one of the algorithm which is use user name and images as a password. We are trying to give set of images by using position of alphabet character in user name and cloud is provide secure graphical password authentication.
Authors and Affiliations
Komal More
ANALYSIS AND SECURITY TESTING OF ANDROID SYSTEM BY MALWARE DETECTION IN NETWORKS
The same principles that organizations use to monitor network traffic go into their networks must be applied to the network traffic originating from mobile devices. This means that the techniques and tools, which would...
Implementation of Command Transfer Protocol for Cluster in Networking
Computational cluster is used for heavy computation that emphasizes various requirements for network functionality. Most of the computing software uses TCP/IP for their computation. But it has lot of disadvantages...
POWER QUALITY IMPROVEMENT AND INTERFACING OF WIND ENERGY SOURCE
Current condition customer electrical power demand is more but electrical power generation is not more. In this case use renewable energy sources for electrical power generation. In this paper renewable energy source...
AT-A-STATION HYDRAULIC GEOMETRY OF TARALI RIVER, MAHARASHTRA: AN IMPACT OF HUMAN INTERVENTION ON CHANNEL
The section of Tarali channel for about 4.325 km in direction upstream from its confluence with River Krishna has been studied through field survey carried out in 7 sessions for the present research work. Of the 9...
A Comprehensive Survey on Various ICIC Schemes and Proposed 3G RF Interference Mitigation Techniques for OFDM Downlink on Cellular Networks
Inter Cell Interference (ICI) still poses a real challenge that limits the Orthogonal Frequency Division Multiplexing Access (OFDMA) system performance, especially for users located at the cell edge. A common Inte...