Graphical Password Strength in Cloud Computing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: In a Network we have various issues to work with our services & data (maintenances) & today Cloud computing provides convenient on-demand network access to a shared pool of configurable enumerate resources. The resources can be rapidly expand with great efficiency and minimal management atop. Cloud is an afraid computing platform from the view point of the cloud users, the system must design structure that not only assure sensitive information by enabling computations with encrypted data, but also assure users from envious behaviours by permissive the validation of the computation result along with an effective authentication mechanism to the user, from the past timing we have a multiple scheme to authorize any interface- here also in order to access a cloud we use textual password which is not much secure in terms of authentication because textual password might be easy to guess & lot of brute force attack has been already done on textual based attack in current world so that still here we are finding an efficient way where we can get a reliable authentication to original user, one of the way which we got is object password or graphical password to authenticate interface which we have described in existing system In this paper, we propose a technique for authenticating cloud which is advance authentication scheme in terms of graphical password at the same time we are going to propose this scheme for using in cloud & in cloud how we can verify the data integrity which we are storing. It is high-speed data verification scheme with minimal loss probability. The proposed system is highly efficient in order to authenticate in proper manner in order to maintain login security & after authentication again to verify our data integrity correctly.
Authors and Affiliations
Archana Bisen , Nitesh Gupta
High Performance Data Encryption based on AdvancedEncryption Standard using FPGA
Abstract: Many digital services, such as confidential video conferencing, medical, military imaging systemsand the rapid progress of Internet, require reliable security and encryption in real time to store and tran...
KURCS: Key Updating for Removing & replacement ofCompromised Sensor Nodes from Wireless Sensor Networks
Abstract : An energy efficient key management scheme is an important aspect to ensure secure services inresource constrained Wireless Sensor Networks (WSNs). There are two parts of key management scheme, i.e.key distribu...
Protecting the movable Endeavor with Network-Based validation and Virtual Computing
A new security architecture for the mobile enterprise which uses network-based security and cloud computing has been proposed in these paper. This newly proposed architecture is mainly for both simplifying ...
Detection of Lung Cancer Stages on CT scan Images by Using Various Image Processing Techniques
Abstract: Lung cancer seems to be the common cause of death among people throughout the world. Early detection of lung cancer can increase the chance of survival among people. The overall 5-year survival rate for l...
Face Recognition using Radial Basis Neural Network
Abstract: In this paper, we propose four techniques for extraction of facial features namely PCA, LDA, KPCA and KFA. The purpose of face feature extraction is to capture certain discriminative features that are unique fo...