Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Implementing Graphical Password and Patternlock Security using MVC into the Cloud Computing

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 79 - Number 8
Year of Publication: 2013
V. Sulochana
R. Parimelazhagan

V Sulochana and R Parimelazhagan. Article: Implementing Graphical Password and Patternlock Security using MVC into the Cloud Computing. International Journal of Computer Applications 79(8):7-10, October 2013. Full text available. BibTeX

	author = {V. Sulochana and R. Parimelazhagan},
	title = {Article: Implementing Graphical Password and Patternlock Security using MVC into the Cloud Computing},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {79},
	number = {8},
	pages = {7-10},
	month = {October},
	note = {Full text available}


This article presents secure authentication system by using sequence level authentication technique which creates/authenticates the password in sequence levels to access the cloud services. The article includes graphical survey and details of proposed sequence authentication technique are presented along with the architecture, data flows, algorithms and implementation, probability of success in breaking authentication.


  • F. A. Alsuaiman, A. El Saddik 2008 Three Dimensional password for more secure authentication, IEEE Transactions on Instrumentation and Measurement Vol. 57, 1929-1938.
  • Ashwini Fulkar, Suchita Sawla, Zubin Khan and Sarang Solanki 2012 A study of graphical passwords and various graphical password authentication schemes,World Research Journal of Human Computer Interaction Vol. 1,04-08.
  • Bo Wang, HongYu Xing 2011 The Application of Cloud Computing in Education Informatization, International Conference on Computer Science and Service System(CSSS).
  • Daphna Weinshall, Scott Kirkpatrick 2004 Passwords you'll never forget, but can't recall, ACM,1399-1402.
  • Dinesha H. A 2012 Multilevel Authentication Technique for Accessing Cloud Services, International Conference on Computing, Communication and Applications (ICCCA), 1-4.
  • Dinesha H. A, V. K. Agrawal 2012 Multi dimensional password generation technique for accessing cloud services, International journal on cloud computing: Services and Architecture (IJCCSA), Vol. 2, 31-39
  • Machha. Narender,M. Y. Babu,M. Mohan Rao 2010 Towards secure design choices for implementing graphical passwords, Global journal of Computer science and Technology,Vol. 10, 24.
  • Partha Pratim Ray 2012 Ray's scheme: Graphical password based hybrid authentication system for smart hand held devices, International journal of computer trends and technology,Vol. 3, 235-241.
  • Prasad. P, Ojha. B, Shahi. R. R, Lal. R, Vaish. A, Goel. U 2011 Three Dimensional Security in Cloud Computing, Computer Research and Development (ICCRD), 3 rd International Conference, Vol 3, 198-201
  • Sneha Vasant Thakare, Deipali. V. Gore 2013 3D Security Cloud Computing Using Graphical Password, International Journal of Advanced Research in Computer and Communication Engineering, Vol 2, 945-949.
  • Tani Naik, Sheetal Koul 2013 Multi-dimensional and Multi-level Authentication Techniques, International Journal of Computer Applications, Vol 75, 17-22.
  • K. Venkataramana, M. Padmavathamma 2012 Agent based approach for authentication in cloud, IJCSITS,Vol. 2,598-603.
  • http://simulation-math. com/VideoEL/(6B)BinomialDistribution. pdf