CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Implementing Graphical Password and Patternlock Security using MVC into the Cloud Computing

by V. Sulochana, R. Parimelazhagan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 8
Year of Publication: 2013
Authors: V. Sulochana, R. Parimelazhagan
10.5120/13759-1599

V. Sulochana, R. Parimelazhagan . Implementing Graphical Password and Patternlock Security using MVC into the Cloud Computing. International Journal of Computer Applications. 79, 8 ( October 2013), 7-10. DOI=10.5120/13759-1599

@article{ 10.5120/13759-1599,
author = { V. Sulochana, R. Parimelazhagan },
title = { Implementing Graphical Password and Patternlock Security using MVC into the Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 8 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number8/13759-1599/ },
doi = { 10.5120/13759-1599 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:27.741645+05:30
%A V. Sulochana
%A R. Parimelazhagan
%T Implementing Graphical Password and Patternlock Security using MVC into the Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 8
%P 7-10
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This article presents secure authentication system by using sequence level authentication technique which creates/authenticates the password in sequence levels to access the cloud services. The article includes graphical survey and details of proposed sequence authentication technique are presented along with the architecture, data flows, algorithms and implementation, probability of success in breaking authentication.

References
  1. F. A. Alsuaiman, A. El Saddik 2008 Three Dimensional password for more secure authentication, IEEE Transactions on Instrumentation and Measurement Vol. 57, 1929-1938.
  2. Ashwini Fulkar, Suchita Sawla, Zubin Khan and Sarang Solanki 2012 A study of graphical passwords and various graphical password authentication schemes,World Research Journal of Human Computer Interaction Vol. 1,04-08.
  3. Bo Wang, HongYu Xing 2011 The Application of Cloud Computing in Education Informatization, International Conference on Computer Science and Service System(CSSS).
  4. Daphna Weinshall, Scott Kirkpatrick 2004 Passwords you'll never forget, but can't recall, ACM,1399-1402.
  5. Dinesha H. A 2012 Multilevel Authentication Technique for Accessing Cloud Services, International Conference on Computing, Communication and Applications (ICCCA), 1-4.
  6. Dinesha H. A, V. K. Agrawal 2012 Multi dimensional password generation technique for accessing cloud services, International journal on cloud computing: Services and Architecture (IJCCSA), Vol. 2, 31-39
  7. Machha. Narender,M. Y. Babu,M. Mohan Rao 2010 Towards secure design choices for implementing graphical passwords, Global journal of Computer science and Technology,Vol. 10, 24.
  8. Partha Pratim Ray 2012 Ray's scheme: Graphical password based hybrid authentication system for smart hand held devices, International journal of computer trends and technology,Vol. 3, 235-241.
  9. Prasad. P, Ojha. B, Shahi. R. R, Lal. R, Vaish. A, Goel. U 2011 Three Dimensional Security in Cloud Computing, Computer Research and Development (ICCRD), 3 rd International Conference, Vol 3, 198-201
  10. Sneha Vasant Thakare, Deipali. V. Gore 2013 3D Security Cloud Computing Using Graphical Password, International Journal of Advanced Research in Computer and Communication Engineering, Vol 2, 945-949.
  11. Tani Naik, Sheetal Koul 2013 Multi-dimensional and Multi-level Authentication Techniques, International Journal of Computer Applications, Vol 75, 17-22.
  12. K. Venkataramana, M. Padmavathamma 2012 Agent based approach for authentication in cloud, IJCSITS,Vol. 2,598-603.
  13. http://simulation-math. com/VideoEL/(6B)BinomialDistribution. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Authentication Graphical Password Sequence level Authentication