SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 734
A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING
CLOUD & DATA VERIFICATION
Rupal Rawat1
, Sreeja Nair2
1
M.Tech (CSE), Oriental college of science & Technology, Bhopal, Affiliated to RGPV, Bhopal, M.P, India
2
Head of the Department (CSE) in Oriental College of science & Technology, Bhopal. Affiliated to RGPV Bhopal,
M.P, India
Abstract
Cloud & its unique authentication schemes are questions to improve its strength & usability to provide a data security to user, it
is an emerging, a fast reaching technique for user to access their data at anytime from anywhere and people count is increasing to
use cloud access, password technique is always a issue in today’s world where a secure scheme & research are going onto this ,
in order to improve better user experience . In this paper we are going to present a new technique for the password which is GUI
based and never introduced before & it is assume to be proven best experimentally & to increase user experience. Also here we
are using it onto the cloud & then on cloud we are enhancing the file checking scheme for the user point of view, that user can
assure about its data onto the cloud.
Keywords: Graphical password, Security, Cloud Access, Secure cloud authentication, Secure Data verification.
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
In a Network, we have various issues to work with our
services & data(maintenances) & today Cloud computing
provides convenient on-demand network access to a shared
pool of configurable computing resources. The resources
can be rapidly deployed with great efficiency and minimal
management overhead. Cloud is an insecure computing
platform from the view point of the cloud users, the system
must design mechanisms that not only protect sensitive
information by enabling computations with encrypted data,
but also protect users from malicious behaviours by
enabling the validation of the computation result along with
an effective authentication mechanism to the user, from the
past timing we have a various scheme to authorize any
interface- here also in order to access a cloud we use textual
password which is not much secure in terms of
authentication because textual password might be easy to
guess & lot of brute force attack has been already done on
textual based attack in current world so that still here we are
finding an efficient way where we can get a reliable
authentication to correct user, one of the way which we got
is object password or graphical password to authenticate
interface which we have described in existing system.
We propose a technique for authenticating cloud which is
advance authentication scheme in terms of graphical
password at the same time we are going to propose this
scheme for using in cloud & in cloud how we can verify the
data integrity which we are storing. It is high-speed data
verification scheme with minimal loss probability. The
proposed approach is highly efficient in order to
authenticate in proper manner in order to maintain login
security & after authentication again to verify our data
integrity correctly.
Organisations today are increasingly looking towards Cloud
Computing as a new revolutionary technology promising to
cut the cost of development and maintenance and still
achieve highly reliable and elastic services. The Cloud
technology is a growing trend and is still undergoing lots of
experiments. Cloud promises huge cost benefits, agility and
scalability to the business. All business data and software
are stored on servers at a remote location referred to as Data
centres. Data centre environment allows enterprises to run
applications faster, with easier manageability and less
maintenance effort, and more rapidly scale resources (e.g.
servers, storage, and networking) to meet fluctuating
business needs. A data centre in cloud environment holds
information that end-users would more traditionally have
stored on their computers. This raise concerns regarding
user privacy protection because users must keep secure data.
So, our proposed system fulfils the above requirement of
user. With the help of this system user can access the cloud
services with proper authentication and he can also check
the integrity of his data stored at cloud.
2. RESEARCH FINDING
Here as we have described about our work – mainly our
contribution will be for the cloud security solution in two
ways-
1. First most to authenticate in order to connect user
with the services of cloud account with the help of
proposed authentication scheme.
2. Second once the user is connected securely again
user should be get assure about the security of data
which kept into the cloud, so here we are providing
a data verification technique to check data integrity.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 735
Firstly getting authentication via our effective password
scheme & then verifying the data integrity with the
procedure demonstrated in image.
2.1 Problem Identification
In current all the schemes user has to remember multiple
images, which might be not easy to remember, there is a
chance sometime that user can’t recall all the images which
user registered.
1. Current password scheme like textual password are
sometime easy to remember & sometime they face
the problem of brute force attack or robot attack.
2. Basic image password is hard to remember
sometime as it has to be chosen by the user and a
set of images need to remember.
3. Using over cloud is probably not been developed
by any other CSP due to above reason.
2.2 Proposed Work Plan
The proposed scheme consists of three procedures, we are
defining below-
1. We are going to demonstrate effective graphical
password authentication scheme in order to
authenticate the cloud.
2. Generating a automated system to generate a key in
order to calculate file verification factor (Fcf).
3. File verification at receiver end or on request for
data integrity verification.
Finally we are going to verify level of security in terms of –
method name & procedure, ease of use, Advantages &
Disadvantages.
2.3 Our System and Assumptions
The secure integrity verification cloud computing storage
model on giving a solution to authenticate it, considered in
this work consists of three main components:
(i) Creating & implementing a new Graphical
authentication scheme to the cloud
(ii) a CSP who manages cloud servers and provides
paid storage space on its infrastructure to store the
owner’s files; and
(iii) Graphically giving access to authorized users — a
set of owner’s clients who have the right to access
the remote data. Cloud computing data storage
system model. The storage model used in this work
can be adopted by many practical applications. For
example, in e-health applications, a trusted
government organization can be considered as the
data owner, and the physicians as the authorized
users who have the right to access the patients’
medical history stored on cloud servers.
The integrity of customer’s data in the cloud may be at risk
due to the following reasons. First, the CSP – whose goal is
likely to make a profit and maintain a reputation – has an
incentive to hide data loss (caused by incidents like
hardware failure, management errors, malicious attacks) or
reclaim storage by discarding data that has not been or is
rarely accessed. Second, a dishonest CSP may store fewer
copies than what has been agreed upon in the service contact
with the data owner. The authentication process is required
to be considered at it best in order to get a proper
authorization to proper user and give a best security level
password scheme to compete its other competitor to provide
best services.
3. LITERATURE REVIEW
Here we are mentioning the literature review the work
which have already done in the field of image password-
Shraddha M. Et al.[1] proposed a new system to authenticate
a user for accessing the cloud services. In their proposed
system for accessing cloud services user has to enter a
alphabetical password of four letters, on the addition of
digits assign to the letters the first digit is selected and the
image subset is fetched from where user has to select two
images as password. Two images are appended to the
images select by user by the server. The combination of all
the four images is the complete password for accessing the
cloud services.
Fawaz A. Alsulaiman and Abdulmotaleb El Saddik [2]
proposed a paper, in this paper a new approach to
authenticate the user is described which is the 3D password
scheme for securing the access only to the authentic user. In
this paper, they present a 3D password authentication
scheme in which while entering the password user interacts
with a 3D virtual environment. The 3D password is a
multifactor authentication scheme in which user interacts
with a virtual 3D environment and interacts with number of
objects present in that environment. User will select some of
objects of his choice and the sequence of objects is the
password for accessing the particular service.
Ms. Vidya Mhaske-Dhamdhere et al. [3] proposed a new
technique for authentication. In their system user navigates
through a virtual 3D environment and select some objects
present in the environment which constitutes the password
for authentication. This scheme is much more user friendly
as user interacts with the environment which is similar to the
real world system.
Rajkumar Chalse et al. [4] proposed a technique to check or
verify the integrity of data stored at cloud. In their work they
explained in cloud data storage system, users store their data
in the cloud and no longer possess the data locally. To check
the integrity of the data stored at cloud a tag is generated
from the data and will be compared with the tag from the
downloaded data. If the value of the tag is similar then the
integrity of the data is maintained otherwise it is
compromised. Thus, storage of files on the distributed cloud
servers must be guarantee the correctness and availability of
the data files and also there is no unauthorized data
modification.
Issa M. Khalil et al. [5] provides comprehensive study of
cloud computing security which includes the dependency
level within classification and also provide a solution to
solve the problem in form of preventive actions instead of
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 736
proactive actions. They have identified 46 issues related
with cloud computing security. These issues have further
been categorized into six classes that form a comprehensive
classification.
Dinesha H A and Dr.V.K Agrawal [6] proposed new
multilevel password generation technique. According to this
technique, a multi-dimensional password is used to access
the cloud. So many parameters are considered to generate
the multidimensional password such as: vendor details,
consumer details, services, privileges etc. These various
input dimension forms the password. They also describe
Probability of Breaking Multi-dimensional Authentication.
Ms. Sneha Vasant Thakare et al. [7] proposed a technique
for security of cloud system using graphical password. They
explains that there are many security issues for accessing
services in cloud. To overcome from these issues the 3D
security system is provided with powerful and more secure
authentication techniques. This system can be used to
categories the files or confidential data on cloud.
Categorization depends on 3 important factors:
Confidentiality, Integrity and Availability. There are three
protection rings from the files to be uploaded has to pass.
From these three rings the innermost is more powerful &
secure. Revised- CIA algorithm is used for file
categorization. The file which is to be uploaded is divided in
three rings. The uppermost ring uses 3D password, the
middle one uses Graphical password and the innermost ring
uses the PCCP (Persuasive clued click point).
Till now the work up to this level has been done, which has
been assumed to be worked with cloud. Here in our
proposed system we are going to extend the available
password scheme and going to show the authentication of
cloud via our proposed scheme & also further we are going
to check the authentication & then integrity verification
about the data which we are storing into the cloud.
4. OBJECTIVE
Our main objective is to make such a system which can
make access to cloud system of only authentic user as well
as user can perform integrity check on his data to check any
unauthorised modifications. Cloud services should ensure
data integrity and provide trust worthy authentication to the
user privacy. Although outsourcing data into the cloud is
economically attractive for the cost and complexity of long-
term large-scale data storage, it’s lacking of offering strong
assurance of data integrity. Cloud computing poses privacy
concerns primarily, because the service provider at any point
in time, may access the data that is on the cloud. The Cloud
service provider could accidentally or deliberately alter or
delete some information from the cloud server. Hence, the
system must have some sort of mechanism to ensure the
data integrity. The current authentication scheme for the
cloud using is textual password & basic image password
which we have demonstrated in existing work, so in order to
get an Intelligence login model we require a secure login
process in order to access our cloud properly & secure we
are using an effective graphical login process which is
derived on basis of assuming the probable security issue in
current graphical password authentication scheme.
5. METHODOLOGY USED (FLOW CHART OF
PROPOSED SYSTEM)
1 Enhanced Graphical password authentication
module generation.
2 Challenge Token Creation.
3 Correctness Verification.
Flow chart of the proposed system is covered in three steps.
They are-
5.1 Registration Process
Fig-1: Registration process to access the cloud
5.2 Login Process
Fig-2: Login process to the cloud
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 737
5.3 Complete Scenario
Fig-3: Complete process for login & integrity check over
cloud
6. CONCLUSIONS AND FUTURE WORK
Cloud Computing is gaining remarkable popularity in the
recent years for its benefits in terms of flexibility,
scalability, reliability and cost effectiveness. Despite all the
promises however, Cloud Computing has one problem:
Security, we studied the problems of data security in cloud
data storage, which is essentially a distributed storage
system. An effective and flexible distributed scheme is
proposed to ensure the login into the cloud server & then
checking correctness of user's data in the cloud servers. By
detailed security and performance analysis, we show that
our scheme is highly efficient in recovering the singleton
losses almost immediately and recovers from busty data
losses. The future work for our research will be in the field
of Intrusion detection technique.
REFERENCES
[1] Shraddha M. Gurav,Leena S. Gawade, Prathamey K.
Rane, Nilesh R. Khochare, ―Graphical password
authentication‖ – cloud securing scheme-2014
International Conference on Electronic Systems,
Signal Processing and Computing Technologies,
IEEE 2014.
[2] Fawaz A. Alsulaiman and Abdulmotaleb El Saddik,
Senior Member, IEEE, “Three-Dimensional
Password for More Secure Authentication” IEEE
TRANSACTIONS ON INSTRUMENTATION AND
MEASUREMENT February 6, 2011.
[3] Ms. Vidya Mhaske-Dhamdhere , Prof. G. A. Patil,
―Three Dimensional Object Used for Data Security‖,
in International Conference on Computational
Intelligence and Communication Networks, IEEE
2010.
[4] Rajkumar Chalse, Ashwin Selokar , Arun Katara, ―A
New Technique of Data Integrity for Analysis of the
Cloud Computing Security‖ in 5th International
Conference on Computational Intelligence and
Communication Networks IEEE 2013.
[5] Issa M. Khalil, Abdallah Khreishah, Salah Bouktif,
Azeem Ahmad , ―Security Concerns in Cloud
Computing‖, in 10th International Conference on
Information Technology: New Generations, IEEE
2013.
[6] Dinesha H A Agrawal ,V K CORI, ―MULTI-
DIMENSIONAL PASSWORD GENERATION
TECHNIQUE FOR ACCESSING CLOUD
SERVICES‖ in International Journal on Cloud
Computing: Services and Architecture
(IJCCSA),Vol.2, No.3, June 2012.
[7] Ms. Sneha Vasant Thakare, Ms. Deipali V. Gore,‖
3D Security Cloud Computing using Graphical
Password‖ in International Journal of Advanced
Research in Computer and Communication
Engineering Vol. 2, Issue 1, January 2013.
[8] Ainul Azila Che Fauzi, A. Noraziah, Tutut Herawan,
and Noriyani Mohd. Zin, ―On Cloud Computing
Security Issues‖, in J.-S. Pan, S.-M. Chen, N.T.
Nguyen (Eds.): ACIIDS 2012, Part II, LNAI 7197,
pp. 560–569, 2012. © Springer-Verlag Berlin
Heidelberg 2012.
[9] Cong Wang, Qian Wang, Kui Ren, Wenjing Lou,
"Towards Secure and Dependable Storage
Services in Cloud Computing," IEEE transactions on
Services Computing, 06 May 2011. Rampal Singh,
IJECS Volume 2 Issue 3 March 2013 Page No. 825-
830 Page 830.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 738
[10] Amazon.com, ―Amazon web services (aws),‖ Online
at http:// aws.amazon.com/, 2009.
BIOGRAPHIES
Rupal Rawat, M.Tech (CSE) Oriental
college of science & Technology, Bhopal.
Affiliated to RGPV, Bhopal, M.P. India
Sreeja Nair, Working as Head of Department CSE, Oriental
College of Science &Technology, Bhopal Affiliated to
RGPV, Bhopal, M.P ,India

More Related Content

What's hot

Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
IJRAT
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
IRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
 
H1803035056
H1803035056H1803035056
H1803035056
IOSR Journals
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
IJERA Editor
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computing
eSAT Publishing House
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
Dr. ritu soni
Dr. ritu soniDr. ritu soni
Dr. ritu soni
ijcite
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report Tagore
Vinoth Kanna
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
IJERA Editor
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Publishing House
 

What's hot (20)

Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
H1803035056
H1803035056H1803035056
H1803035056
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computing
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Dr. ritu soni
Dr. ritu soniDr. ritu soni
Dr. ritu soni
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report Tagore
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 

Viewers also liked

Intelligent vehicle control based on identification of
Intelligent vehicle control based on identification ofIntelligent vehicle control based on identification of
Intelligent vehicle control based on identification of
eSAT Publishing House
 
Shear and flexural behavior of ferro cement deep
Shear and flexural behavior of ferro cement deepShear and flexural behavior of ferro cement deep
Shear and flexural behavior of ferro cement deep
eSAT Publishing House
 
Performance analysis of image filtering algorithms for mri images
Performance analysis of image filtering algorithms for mri imagesPerformance analysis of image filtering algorithms for mri images
Performance analysis of image filtering algorithms for mri images
eSAT Publishing House
 
Identifying e learner’s opinion using automated sentiment analysis in e-learning
Identifying e learner’s opinion using automated sentiment analysis in e-learningIdentifying e learner’s opinion using automated sentiment analysis in e-learning
Identifying e learner’s opinion using automated sentiment analysis in e-learning
eSAT Publishing House
 
Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...
eSAT Publishing House
 
Real time detecting driver’s drowsiness using computer vision
Real time detecting driver’s drowsiness using computer visionReal time detecting driver’s drowsiness using computer vision
Real time detecting driver’s drowsiness using computer vision
eSAT Publishing House
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improved
eSAT Publishing House
 
Effect of depth to thickness ratio and length to depth ratio on hollow sectio...
Effect of depth to thickness ratio and length to depth ratio on hollow sectio...Effect of depth to thickness ratio and length to depth ratio on hollow sectio...
Effect of depth to thickness ratio and length to depth ratio on hollow sectio...
eSAT Publishing House
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
eSAT Publishing House
 
Swing, voltage stability and power transfer capability
Swing, voltage stability and power transfer capabilitySwing, voltage stability and power transfer capability
Swing, voltage stability and power transfer capability
eSAT Publishing House
 
Effect of free surface wave on free vibration of a
Effect of free surface wave on free vibration of aEffect of free surface wave on free vibration of a
Effect of free surface wave on free vibration of a
eSAT Publishing House
 
Automatic collision detection for an autonomous robot using proximity sensing...
Automatic collision detection for an autonomous robot using proximity sensing...Automatic collision detection for an autonomous robot using proximity sensing...
Automatic collision detection for an autonomous robot using proximity sensing...
eSAT Publishing House
 
An analysis of environmental impacts of various environmental aspects for ind...
An analysis of environmental impacts of various environmental aspects for ind...An analysis of environmental impacts of various environmental aspects for ind...
An analysis of environmental impacts of various environmental aspects for ind...
eSAT Publishing House
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...
eSAT Publishing House
 
Isolated word recognition using lpc & vector quantization
Isolated word recognition using lpc & vector quantizationIsolated word recognition using lpc & vector quantization
Isolated word recognition using lpc & vector quantization
eSAT Publishing House
 
Congestion control in computer networks using a
Congestion control in computer networks using aCongestion control in computer networks using a
Congestion control in computer networks using a
eSAT Publishing House
 
The use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingThe use of polynomial shape function in the buckling
The use of polynomial shape function in the buckling
eSAT Publishing House
 
Restrained lict domination in graphs
Restrained lict domination in graphsRestrained lict domination in graphs
Restrained lict domination in graphs
eSAT Publishing House
 
Microstrip circular patch array antenna for electronic toll collection
Microstrip circular patch array antenna for electronic toll collectionMicrostrip circular patch array antenna for electronic toll collection
Microstrip circular patch array antenna for electronic toll collection
eSAT Publishing House
 
Detection of multiword from a wordnet is complex
Detection of multiword from a wordnet is complexDetection of multiword from a wordnet is complex
Detection of multiword from a wordnet is complex
eSAT Publishing House
 

Viewers also liked (20)

Intelligent vehicle control based on identification of
Intelligent vehicle control based on identification ofIntelligent vehicle control based on identification of
Intelligent vehicle control based on identification of
 
Shear and flexural behavior of ferro cement deep
Shear and flexural behavior of ferro cement deepShear and flexural behavior of ferro cement deep
Shear and flexural behavior of ferro cement deep
 
Performance analysis of image filtering algorithms for mri images
Performance analysis of image filtering algorithms for mri imagesPerformance analysis of image filtering algorithms for mri images
Performance analysis of image filtering algorithms for mri images
 
Identifying e learner’s opinion using automated sentiment analysis in e-learning
Identifying e learner’s opinion using automated sentiment analysis in e-learningIdentifying e learner’s opinion using automated sentiment analysis in e-learning
Identifying e learner’s opinion using automated sentiment analysis in e-learning
 
Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...
 
Real time detecting driver’s drowsiness using computer vision
Real time detecting driver’s drowsiness using computer visionReal time detecting driver’s drowsiness using computer vision
Real time detecting driver’s drowsiness using computer vision
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improved
 
Effect of depth to thickness ratio and length to depth ratio on hollow sectio...
Effect of depth to thickness ratio and length to depth ratio on hollow sectio...Effect of depth to thickness ratio and length to depth ratio on hollow sectio...
Effect of depth to thickness ratio and length to depth ratio on hollow sectio...
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
 
Swing, voltage stability and power transfer capability
Swing, voltage stability and power transfer capabilitySwing, voltage stability and power transfer capability
Swing, voltage stability and power transfer capability
 
Effect of free surface wave on free vibration of a
Effect of free surface wave on free vibration of aEffect of free surface wave on free vibration of a
Effect of free surface wave on free vibration of a
 
Automatic collision detection for an autonomous robot using proximity sensing...
Automatic collision detection for an autonomous robot using proximity sensing...Automatic collision detection for an autonomous robot using proximity sensing...
Automatic collision detection for an autonomous robot using proximity sensing...
 
An analysis of environmental impacts of various environmental aspects for ind...
An analysis of environmental impacts of various environmental aspects for ind...An analysis of environmental impacts of various environmental aspects for ind...
An analysis of environmental impacts of various environmental aspects for ind...
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...
 
Isolated word recognition using lpc & vector quantization
Isolated word recognition using lpc & vector quantizationIsolated word recognition using lpc & vector quantization
Isolated word recognition using lpc & vector quantization
 
Congestion control in computer networks using a
Congestion control in computer networks using aCongestion control in computer networks using a
Congestion control in computer networks using a
 
The use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingThe use of polynomial shape function in the buckling
The use of polynomial shape function in the buckling
 
Restrained lict domination in graphs
Restrained lict domination in graphsRestrained lict domination in graphs
Restrained lict domination in graphs
 
Microstrip circular patch array antenna for electronic toll collection
Microstrip circular patch array antenna for electronic toll collectionMicrostrip circular patch array antenna for electronic toll collection
Microstrip circular patch array antenna for electronic toll collection
 
Detection of multiword from a wordnet is complex
Detection of multiword from a wordnet is complexDetection of multiword from a wordnet is complex
Detection of multiword from a wordnet is complex
 

Similar to A novel graphical password approach for accessing cloud & data verification

A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
eSAT Journals
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
IRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
eSAT Publishing House
 
publishable paper
publishable paperpublishable paper
publishable paper
chaitanya451336
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
C04932125
C04932125C04932125
C04932125
IOSR-JEN
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
eSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
eSAT Publishing House
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Journals
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
I42024349
I42024349I42024349
I42024349
IJERA Editor
 
R180203114117
R180203114117R180203114117
R180203114117
IOSR Journals
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET Journal
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Editor IJARCET
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Editor IJARCET
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloud
eSAT Publishing House
 

Similar to A novel graphical password approach for accessing cloud & data verification (20)

A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
C04932125
C04932125C04932125
C04932125
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
I42024349
I42024349I42024349
I42024349
 
R180203114117
R180203114117R180203114117
R180203114117
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloud
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
cannyengineerings
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt
abdatawakjira
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
Shiny Christobel
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 

Recently uploaded (20)

Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 

A novel graphical password approach for accessing cloud & data verification

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 734 A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION Rupal Rawat1 , Sreeja Nair2 1 M.Tech (CSE), Oriental college of science & Technology, Bhopal, Affiliated to RGPV, Bhopal, M.P, India 2 Head of the Department (CSE) in Oriental College of science & Technology, Bhopal. Affiliated to RGPV Bhopal, M.P, India Abstract Cloud & its unique authentication schemes are questions to improve its strength & usability to provide a data security to user, it is an emerging, a fast reaching technique for user to access their data at anytime from anywhere and people count is increasing to use cloud access, password technique is always a issue in today’s world where a secure scheme & research are going onto this , in order to improve better user experience . In this paper we are going to present a new technique for the password which is GUI based and never introduced before & it is assume to be proven best experimentally & to increase user experience. Also here we are using it onto the cloud & then on cloud we are enhancing the file checking scheme for the user point of view, that user can assure about its data onto the cloud. Keywords: Graphical password, Security, Cloud Access, Secure cloud authentication, Secure Data verification. ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION In a Network, we have various issues to work with our services & data(maintenances) & today Cloud computing provides convenient on-demand network access to a shared pool of configurable computing resources. The resources can be rapidly deployed with great efficiency and minimal management overhead. Cloud is an insecure computing platform from the view point of the cloud users, the system must design mechanisms that not only protect sensitive information by enabling computations with encrypted data, but also protect users from malicious behaviours by enabling the validation of the computation result along with an effective authentication mechanism to the user, from the past timing we have a various scheme to authorize any interface- here also in order to access a cloud we use textual password which is not much secure in terms of authentication because textual password might be easy to guess & lot of brute force attack has been already done on textual based attack in current world so that still here we are finding an efficient way where we can get a reliable authentication to correct user, one of the way which we got is object password or graphical password to authenticate interface which we have described in existing system. We propose a technique for authenticating cloud which is advance authentication scheme in terms of graphical password at the same time we are going to propose this scheme for using in cloud & in cloud how we can verify the data integrity which we are storing. It is high-speed data verification scheme with minimal loss probability. The proposed approach is highly efficient in order to authenticate in proper manner in order to maintain login security & after authentication again to verify our data integrity correctly. Organisations today are increasingly looking towards Cloud Computing as a new revolutionary technology promising to cut the cost of development and maintenance and still achieve highly reliable and elastic services. The Cloud technology is a growing trend and is still undergoing lots of experiments. Cloud promises huge cost benefits, agility and scalability to the business. All business data and software are stored on servers at a remote location referred to as Data centres. Data centre environment allows enterprises to run applications faster, with easier manageability and less maintenance effort, and more rapidly scale resources (e.g. servers, storage, and networking) to meet fluctuating business needs. A data centre in cloud environment holds information that end-users would more traditionally have stored on their computers. This raise concerns regarding user privacy protection because users must keep secure data. So, our proposed system fulfils the above requirement of user. With the help of this system user can access the cloud services with proper authentication and he can also check the integrity of his data stored at cloud. 2. RESEARCH FINDING Here as we have described about our work – mainly our contribution will be for the cloud security solution in two ways- 1. First most to authenticate in order to connect user with the services of cloud account with the help of proposed authentication scheme. 2. Second once the user is connected securely again user should be get assure about the security of data which kept into the cloud, so here we are providing a data verification technique to check data integrity.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 735 Firstly getting authentication via our effective password scheme & then verifying the data integrity with the procedure demonstrated in image. 2.1 Problem Identification In current all the schemes user has to remember multiple images, which might be not easy to remember, there is a chance sometime that user can’t recall all the images which user registered. 1. Current password scheme like textual password are sometime easy to remember & sometime they face the problem of brute force attack or robot attack. 2. Basic image password is hard to remember sometime as it has to be chosen by the user and a set of images need to remember. 3. Using over cloud is probably not been developed by any other CSP due to above reason. 2.2 Proposed Work Plan The proposed scheme consists of three procedures, we are defining below- 1. We are going to demonstrate effective graphical password authentication scheme in order to authenticate the cloud. 2. Generating a automated system to generate a key in order to calculate file verification factor (Fcf). 3. File verification at receiver end or on request for data integrity verification. Finally we are going to verify level of security in terms of – method name & procedure, ease of use, Advantages & Disadvantages. 2.3 Our System and Assumptions The secure integrity verification cloud computing storage model on giving a solution to authenticate it, considered in this work consists of three main components: (i) Creating & implementing a new Graphical authentication scheme to the cloud (ii) a CSP who manages cloud servers and provides paid storage space on its infrastructure to store the owner’s files; and (iii) Graphically giving access to authorized users — a set of owner’s clients who have the right to access the remote data. Cloud computing data storage system model. The storage model used in this work can be adopted by many practical applications. For example, in e-health applications, a trusted government organization can be considered as the data owner, and the physicians as the authorized users who have the right to access the patients’ medical history stored on cloud servers. The integrity of customer’s data in the cloud may be at risk due to the following reasons. First, the CSP – whose goal is likely to make a profit and maintain a reputation – has an incentive to hide data loss (caused by incidents like hardware failure, management errors, malicious attacks) or reclaim storage by discarding data that has not been or is rarely accessed. Second, a dishonest CSP may store fewer copies than what has been agreed upon in the service contact with the data owner. The authentication process is required to be considered at it best in order to get a proper authorization to proper user and give a best security level password scheme to compete its other competitor to provide best services. 3. LITERATURE REVIEW Here we are mentioning the literature review the work which have already done in the field of image password- Shraddha M. Et al.[1] proposed a new system to authenticate a user for accessing the cloud services. In their proposed system for accessing cloud services user has to enter a alphabetical password of four letters, on the addition of digits assign to the letters the first digit is selected and the image subset is fetched from where user has to select two images as password. Two images are appended to the images select by user by the server. The combination of all the four images is the complete password for accessing the cloud services. Fawaz A. Alsulaiman and Abdulmotaleb El Saddik [2] proposed a paper, in this paper a new approach to authenticate the user is described which is the 3D password scheme for securing the access only to the authentic user. In this paper, they present a 3D password authentication scheme in which while entering the password user interacts with a 3D virtual environment. The 3D password is a multifactor authentication scheme in which user interacts with a virtual 3D environment and interacts with number of objects present in that environment. User will select some of objects of his choice and the sequence of objects is the password for accessing the particular service. Ms. Vidya Mhaske-Dhamdhere et al. [3] proposed a new technique for authentication. In their system user navigates through a virtual 3D environment and select some objects present in the environment which constitutes the password for authentication. This scheme is much more user friendly as user interacts with the environment which is similar to the real world system. Rajkumar Chalse et al. [4] proposed a technique to check or verify the integrity of data stored at cloud. In their work they explained in cloud data storage system, users store their data in the cloud and no longer possess the data locally. To check the integrity of the data stored at cloud a tag is generated from the data and will be compared with the tag from the downloaded data. If the value of the tag is similar then the integrity of the data is maintained otherwise it is compromised. Thus, storage of files on the distributed cloud servers must be guarantee the correctness and availability of the data files and also there is no unauthorized data modification. Issa M. Khalil et al. [5] provides comprehensive study of cloud computing security which includes the dependency level within classification and also provide a solution to solve the problem in form of preventive actions instead of
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 736 proactive actions. They have identified 46 issues related with cloud computing security. These issues have further been categorized into six classes that form a comprehensive classification. Dinesha H A and Dr.V.K Agrawal [6] proposed new multilevel password generation technique. According to this technique, a multi-dimensional password is used to access the cloud. So many parameters are considered to generate the multidimensional password such as: vendor details, consumer details, services, privileges etc. These various input dimension forms the password. They also describe Probability of Breaking Multi-dimensional Authentication. Ms. Sneha Vasant Thakare et al. [7] proposed a technique for security of cloud system using graphical password. They explains that there are many security issues for accessing services in cloud. To overcome from these issues the 3D security system is provided with powerful and more secure authentication techniques. This system can be used to categories the files or confidential data on cloud. Categorization depends on 3 important factors: Confidentiality, Integrity and Availability. There are three protection rings from the files to be uploaded has to pass. From these three rings the innermost is more powerful & secure. Revised- CIA algorithm is used for file categorization. The file which is to be uploaded is divided in three rings. The uppermost ring uses 3D password, the middle one uses Graphical password and the innermost ring uses the PCCP (Persuasive clued click point). Till now the work up to this level has been done, which has been assumed to be worked with cloud. Here in our proposed system we are going to extend the available password scheme and going to show the authentication of cloud via our proposed scheme & also further we are going to check the authentication & then integrity verification about the data which we are storing into the cloud. 4. OBJECTIVE Our main objective is to make such a system which can make access to cloud system of only authentic user as well as user can perform integrity check on his data to check any unauthorised modifications. Cloud services should ensure data integrity and provide trust worthy authentication to the user privacy. Although outsourcing data into the cloud is economically attractive for the cost and complexity of long- term large-scale data storage, it’s lacking of offering strong assurance of data integrity. Cloud computing poses privacy concerns primarily, because the service provider at any point in time, may access the data that is on the cloud. The Cloud service provider could accidentally or deliberately alter or delete some information from the cloud server. Hence, the system must have some sort of mechanism to ensure the data integrity. The current authentication scheme for the cloud using is textual password & basic image password which we have demonstrated in existing work, so in order to get an Intelligence login model we require a secure login process in order to access our cloud properly & secure we are using an effective graphical login process which is derived on basis of assuming the probable security issue in current graphical password authentication scheme. 5. METHODOLOGY USED (FLOW CHART OF PROPOSED SYSTEM) 1 Enhanced Graphical password authentication module generation. 2 Challenge Token Creation. 3 Correctness Verification. Flow chart of the proposed system is covered in three steps. They are- 5.1 Registration Process Fig-1: Registration process to access the cloud 5.2 Login Process Fig-2: Login process to the cloud
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 737 5.3 Complete Scenario Fig-3: Complete process for login & integrity check over cloud 6. CONCLUSIONS AND FUTURE WORK Cloud Computing is gaining remarkable popularity in the recent years for its benefits in terms of flexibility, scalability, reliability and cost effectiveness. Despite all the promises however, Cloud Computing has one problem: Security, we studied the problems of data security in cloud data storage, which is essentially a distributed storage system. An effective and flexible distributed scheme is proposed to ensure the login into the cloud server & then checking correctness of user's data in the cloud servers. By detailed security and performance analysis, we show that our scheme is highly efficient in recovering the singleton losses almost immediately and recovers from busty data losses. The future work for our research will be in the field of Intrusion detection technique. REFERENCES [1] Shraddha M. Gurav,Leena S. Gawade, Prathamey K. Rane, Nilesh R. Khochare, ―Graphical password authentication‖ – cloud securing scheme-2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies, IEEE 2014. [2] Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, Senior Member, IEEE, “Three-Dimensional Password for More Secure Authentication” IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT February 6, 2011. [3] Ms. Vidya Mhaske-Dhamdhere , Prof. G. A. Patil, ―Three Dimensional Object Used for Data Security‖, in International Conference on Computational Intelligence and Communication Networks, IEEE 2010. [4] Rajkumar Chalse, Ashwin Selokar , Arun Katara, ―A New Technique of Data Integrity for Analysis of the Cloud Computing Security‖ in 5th International Conference on Computational Intelligence and Communication Networks IEEE 2013. [5] Issa M. Khalil, Abdallah Khreishah, Salah Bouktif, Azeem Ahmad , ―Security Concerns in Cloud Computing‖, in 10th International Conference on Information Technology: New Generations, IEEE 2013. [6] Dinesha H A Agrawal ,V K CORI, ―MULTI- DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES‖ in International Journal on Cloud Computing: Services and Architecture (IJCCSA),Vol.2, No.3, June 2012. [7] Ms. Sneha Vasant Thakare, Ms. Deipali V. Gore,‖ 3D Security Cloud Computing using Graphical Password‖ in International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 1, January 2013. [8] Ainul Azila Che Fauzi, A. Noraziah, Tutut Herawan, and Noriyani Mohd. Zin, ―On Cloud Computing Security Issues‖, in J.-S. Pan, S.-M. Chen, N.T. Nguyen (Eds.): ACIIDS 2012, Part II, LNAI 7197, pp. 560–569, 2012. © Springer-Verlag Berlin Heidelberg 2012. [9] Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," IEEE transactions on Services Computing, 06 May 2011. Rampal Singh, IJECS Volume 2 Issue 3 March 2013 Page No. 825- 830 Page 830.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 738 [10] Amazon.com, ―Amazon web services (aws),‖ Online at http:// aws.amazon.com/, 2009. BIOGRAPHIES Rupal Rawat, M.Tech (CSE) Oriental college of science & Technology, Bhopal. Affiliated to RGPV, Bhopal, M.P. India Sreeja Nair, Working as Head of Department CSE, Oriental College of Science &Technology, Bhopal Affiliated to RGPV, Bhopal, M.P ,India