CFP last date
20 May 2024
Reseach Article

Generate Secure Image based Password to Access the Cloud Data

by Anuja Patole, A. C. Lomte
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 43
Year of Publication: 2019
Authors: Anuja Patole, A. C. Lomte
10.5120/ijca2019919311

Anuja Patole, A. C. Lomte . Generate Secure Image based Password to Access the Cloud Data. International Journal of Computer Applications. 178, 43 ( Aug 2019), 4-8. DOI=10.5120/ijca2019919311

@article{ 10.5120/ijca2019919311,
author = { Anuja Patole, A. C. Lomte },
title = { Generate Secure Image based Password to Access the Cloud Data },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2019 },
volume = { 178 },
number = { 43 },
month = { Aug },
year = { 2019 },
issn = { 0975-8887 },
pages = { 4-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number43/30823-2019919311/ },
doi = { 10.5120/ijca2019919311 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:52:57.371277+05:30
%A Anuja Patole
%A A. C. Lomte
%T Generate Secure Image based Password to Access the Cloud Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 43
%P 4-8
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defense against intrusion. A password may be textual with any combination of alphanumeric characters. But no authentication protocol is fully secured against todays hackers as all of them are Static in type. Dynamic authentication protocol is still a theoretical concept. In this paper, proposed system doing introduce a secure data scheme with cryptographic primitives for data access from the database server. In a proposed methodology using the data encryption and steganography technique to secure the image password generation to secure access on the data server’s files, for more security splitting technique used to the stegno image for verification server side and client side user data. This system provides strong data security to storage on local cloud server and also provide the strong security to registered users during data uploads and downloads user data. In this paper covered the idea of generating an algorithm for generates secure image based password authentication system.

References
  1. John K. Alhassan, Idris Ismaila, Victor O. Waziri, and Adamu Abdulkadir, “A Secure Method to Hide Confidential Data Using Cryptography and Steganography”, Federal University of Technology, Minna, Nigeria November 28 – 30, 2016.
  2. R. Nivedhitha, Dr. T.Meyyappan, “Image Security Using Steganography And Cryptographic Techniques”, International Journal of Engineering Trends and Technology- Volume3Issue3- 2012.
  3. Ako Muhammad Abdullah, Roza Hikmat Hama Aziz, “New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm” International Journal of Computer Applications, Volume 143 – No.4, June 2016.
  4. Dipankar Dasgupta, Rukhsana Azeem,” A Negative Authentication System” 2007 (revised on April 15, 2007), The University of Memphis.
  5. Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha, “An Encryption Key for Secure Authentication: The Dynamic Solution”, Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 3, 540-544 (2017).
  6. D. Wang, D. He, H. Cheng, and P. Wang, “fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars,” in Proceedings of 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun. 2016, pp. 595–606.
  7. H. M. Sun, Y. H. Chen, and Y. H. Lin, “oPass: A user authentication protocol resistant to password stealing and password reuse attacks,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 651–663, Apr. 2012.
  8. Y. Li, H. Wang, and K. Sun, “Personal information in passwords and its security implications,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2320– 2333, Oct. 2017.
  9. D. Florencio and C. Herley, “A large-scale study of web password habits,” in Proceedings of the 16thInternational Conference on World Wide Web. ACM, 2007, pp. 657–666.
  10. R. Shay, S. Komanduri, A. L. Durity, P. S. Huh,M. L. Mazurek, S. M. Segreti, B. Ur, L. Bauer, N. Christin, and L. F. Cranor, “Designing password policies for strength and usability,” ACM Transactions on Information and System Security, vol. 18, no. 4, pp. 13:1–13:34, May 2016
Index Terms

Computer Science
Information Sciences

Keywords

Images based password Recognition based technique data verification password protection blowfish algorithm.