Graphical Password Strength in Cloud Computing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: In a Network we have various issues to work with our services & data (maintenances) & today Cloud computing provides convenient on-demand network access to a shared pool of configurable enumerate resources. The resources can be rapidly expand with great efficiency and minimal management atop. Cloud is an afraid computing platform from the view point of the cloud users, the system must design structure that not only assure sensitive information by enabling computations with encrypted data, but also assure users from envious behaviours by permissive the validation of the computation result along with an effective authentication mechanism to the user, from the past timing we have a multiple scheme to authorize any interface- here also in order to access a cloud we use textual password which is not much secure in terms of authentication because textual password might be easy to guess & lot of brute force attack has been already done on textual based attack in current world so that still here we are finding an efficient way where we can get a reliable authentication to original user, one of the way which we got is object password or graphical password to authenticate interface which we have described in existing system In this paper, we propose a technique for authenticating cloud which is advance authentication scheme in terms of graphical password at the same time we are going to propose this scheme for using in cloud & in cloud how we can verify the data integrity which we are storing. It is high-speed data verification scheme with minimal loss probability. The proposed system is highly efficient in order to authenticate in proper manner in order to maintain login security & after authentication again to verify our data integrity correctly.
Authors and Affiliations
Archana Bisen , Nitesh Gupta
Monitoring Wireless Sensor Network using Android based Smart Phone Application
Abstract: Wireless Sensor Network application’s is use in detection of natural calamities like forest fire detection, flood detection, , earth quick early detection ,snow detection, traffic congestion and various o...
An Energy Efficient Traffic Routing On Wake-Up Process in Wireless Sensor Network
Abstract: Wireless network consists of distributed sensor nodes to monitor the physical conditions and establish the traffic system. Every node in WSN sends and receives the packet, resulting in wastage of bandwidth.Howe...
Problem Domains in Complex Networks
Abstract: Many real world Networks can be represented with the help of complex networks. Complex networks are special graphs with non trivial topological properties—features that do not occur in simple networks such as l...
An Evaluation of the Influence of Pupils’ Physiological Needs Satisfaction on Academic Performance of Public Primary Schools in Eastern Zone of Nakuru Municipality, Kenya
Abstract: This study investigated the influence of physiological needs on academic performance in public primary schools of the Eastern Zone of Nakuru Municipality. The study used survey research design to establish the...
"Applying mathematical models in cloud computing: A survey"
Abstract: As more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. It is better to prevent security threats before...