SlideShare a Scribd company logo
Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59
www.ijera.com 56 | P a g e
Password authentication in cloud
Indal Singh1
Rajesh Rai2
Sachin Murarkar3
M.Tech Scholar NRI Institute of Information Science & Technology Bhopal (M.P)-462021, India
Abstract
Cloud computing is an Internet-based computing, whereby shared resources, software, and information are
provided to computers and other devices on demand. However, adopting a cloud computing paradigm may have
positive as well as negative effects on the data security of service consumers [1]. Cloud Computing is a term
used to describe both a platform and type of application. As a platform it supplies, configures and reconfigures
servers, while the servers can be physical machines or virtual machines. On the other hand, Cloud Computing
describes applications that are extended to be accessible through the internet and for this purpose large data
centers and powerful servers are used to host the web applications and web services. Authentication is one the
most important security primitive [6]. Password authentication is most widely used authentication mechanism.
Password provides security mechanism for authentication and protection services against unwanted access to
resource. In this paper, we applied a technique to preserve our password using graphical authentication.
Keywords- Cloud computing, Sender, Receiver, Data security.
I. Introduction
User authentication is a fundamental component
in most computer security contexts. It provides the
basis for access control and user accountability [2].
When anyone wants to access the network, for
security purposes every web application provides
user authentication. From ancient day’s secret data or
code is used for hiding and giving security to
information. In user authentication the process which
we have to pass through is username and password.
Authentication process divided into Token based
authentication, Biometric based authentication and
Knowledge based authentication. Most of the web
application provides knowledge based authentication
which include alphanumeric password as well as
graphical password. In today’s changing world when
we are having number of networks and personal
account some sort of easy authentication [3] schema
need to be provided.
II. Basics models of Cloud Computing
Service Models of Cloud Computing: - According
to NIST, the cloud model is composed of three
service models:
Software as a Service (SaaS): The capability
provided to the consumer is to use the provider’s
applications running on a cloud infrastructure. The
applications are accessible from various client
devices through either a thin client interface, such as
a web browser (e.g., web-based email), or a program
interface. The consumer does not manage or control
the underlying cloud infrastructure including
network, servers, operating systems, storage, or even
individual application capabilities, with the possible
exception of limited user-specific application
configuration settings [4].
Platform as a Service (PaaS): The capability
provided to the consumer is to deploy onto the cloud
infrastructure consumer-created or acquired
applications created using programming languages,
libraries, services, and tools supported by the
provider. The consumer does not manage or control
the underlying cloud infrastructure including
network, servers, operating systems, or storage, but
has control over the deployed applications and
possibly configuration settings for the application-
hosting environment [4].
Infrastructure as a Service (IaaS): The capability
provided to the consumer is to provision processing,
storage, networks, and other fundamental computing
resources where the consumer is able to deploy and
run arbitrary software, which can include operating
systems and applications. The consumer does not
manage or control the underlying cloud infrastructure
but has control over operating systems, storage, and
deployed applications; and possibly limited control of
select networking components (e.g., host firewalls)
[4].
Deployment Models of Cloud Computing: -
According to NIST, the cloud model is composed of
four deployment models:
Private cloud: The cloud infrastructure is
provisioned for exclusive use by a single organization
comprising multiple consumers (e.g., business units).
It may be owned, managed, and operated by the
RESEARCH ARTICLE OPEN ACCESS
Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59
www.ijera.com 57 | P a g e
organization, a third party, or some combination of
them, and it may exist on or off premises [4].
Community cloud: The cloud infrastructure is
provisioned for exclusive use by a specific
community of consumers from organizations that
have shared concerns (e.g., mission, security
requirements, policy, and compliance
considerations). It may be owned, managed, and
operated by one or more of the organizations in the
community, a third party, or some combination of
them, and it may exist on or off premises [4].
Public cloud: The cloud infrastructure is provisioned
for open use by the general public. It may be owned,
managed, and operated by a business, academic, or
government organization, or some combination of
them. It exists on the premises of the cloud provider
[4].
Figure 1 Service & delivery models in cloud
Hybrid cloud: The cloud infrastructure is a
composition of two or more distinct cloud
infrastructures (private, community, or public) that
remain unique entities, but are bound together by
standardized or proprietary technology that enables
data and application portability (e.g., cloud bursting
for load balancing between clouds) [4].
III. Classification of Authentication
methods
Authentication is a process of determining
whether a particular individual or a device should be
allowed to access a system or an application or
simply an object running in a device. Authentication
process assures the basic security goals, i.e.
confidentiality and integrity. The first line of defense
for protecting any resource is Authentication [8].
Authentication is a process of validating who
you are to whom you claimed to be, or in other words
a process of identifying an individual, usually based
on a username and password. Currently what we have
in the field, are the following set of techniques [9]:
Human Authentication Techniques are as follows:
1. Knowledge Base (What you know)
2. Token Based (What you have)
3. Biometrics (What you are)
4. Recognition Based (What you recognize)
Computer Authentication Techniques are as follows:
1. Textual Passwords
2. Graphical Passwords
3. Biometric schemes (fingerprints, voice recognition
etc.)
Figure 2 Classification of Authentication methods
IV. Problem Formulated
In this paper, we had proposed a method of
password authentication by implementing double
authentication technique. In the first step of
authentication we apply the binary addition to our
chosen username & in the second step we send the
carry forward by OTP (One-Time Password) to the
receiver, so as to decode the sent data.
Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59
www.ijera.com 58 | P a g e
V. Proposed Methodology
Assigning the values: - First of all, we created a tree
diagram in which left arm (i.e. left sub-tree) is
assigned the value as 0 & right arm is assigned as 1.
On the basis of values so obtained, we obtained a
table.
Figure 3 Tree diagram
1 = 0
2 = 00
3 = 01
4 = 000
5 = 001
6 = 011
7 = 010
8 = 0010
9 = 0100
Table1 Positions of numeric values
Username calculation: - Enter username not more
than 6 characters.
Example
Figure 4 Binary values of positions 1234 according
to tree diagram
For username 1234
1 2 3 4
0 00 01 000
Now, by adding the redundancy bits 1111 to the
above generated bits, we get,
0 1111 00 1111 01 1111 000
Performing binary addition of the obtained binary
value of the username:
carry 1111111111111111
01111001111011111000
+11111111111111111111
101111001111011110111
The obtained result is 101111001111011110111.
We will now the obtained bit to the receiver and
send 1 of the first place of the data stream as OTP
(One Time Password) to the mobile of the receiver
for more secure authentication & the remaining 20
bits directly. When the user receives both the values,
he knows what to do next.
The receiver then add the carry 1 to the 20-bit
received values to obtain the desired value.
Here, 00000111(8-bit) and carry 1 will be added to
get desired result.
111
01111001111011110111
+1
01111001111011111000
Thus, the decoded password is
01111001111011111000.
Now, by removing the redundancy bits the original
data is found i.e. 0 00 01 000 = 1 2 3 4
Figure 5 Working and flow of bits from sender to
receiver
Algorithm for sender:
Step 1. Design tree for digit 1 to 9.
Step 2. Start from 1, assign left sub-tree as 0 and right
sub-tree as 1.
Step 3. Repeat the procedure up to 9.
Step 4. Enter the username.
Step 5. Assign values to the digits in the username
i.e. 1=0, 2=00, 3=01 etc.
Step 6. Insert redundancy bits between the values of
the username.
Step 7. Now, perform the binary addition of the
obtained data stream after adding redundancy bits.
Step 8. Send the 20-bits directly to the receiver and
the digit at the first place as OTP to the receiver’s
mobile.
Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59
www.ijera.com 59 | P a g e
Figure 6 Flow chart for sender
Algorithm for receiver:
Step 1. Received data and OTP at receiver’s side.
Step 2. Now, add this OTP bit to the received data
stream of 20-bits.
Step 3. By performing addition of OTP to the 20-bit
data stream, we get the data stream with added
redundancy.
Step 4. Perform removal of redundancy bits from the
original data.
Step 5. Now, assigns values to the obtained original
data.
Step 6. Thus, the original data is found.
Figure 7 Flow chart for receiver
VI. CONCLUSION
Lack of privacy and security is the main hurdle
in the wide adoption of cloud computing. We are
almost at the beginning of the cloud era; it is hard to
predict the impact of cloud computing on society.
Cloud computing is not fully mature and needs to be
explored [4].
This technique provides more secure password
authentication than usual graphical password
authentication techniques. Moreover, the extra bit
from the result which is sent as OTP adds more
security to password authentication technique.
References
[1] Mishra, R. ; Sch. of Comput. Eng., KIIT
Univ., Bhubaneswar, India ; Dash,
S.K. ; Mishra, D.P. ; Tripathy, A., A privacy
preserving repository for securing data
across the cloud, 2011.
[2] William Stallings and Lawrie Brown.
Computer Security: Principle and Practices.
Pearson Education, 2008.
[3] Authentication Using Graphical Passwords:
Effects of Tolerance and Image Choice
Susan Wiedenbeck Jim Waters College of
IST Drexel University Philadelphia.
[4] Peter Mell. (2011) 'The NIST Definition of
Cloud', Reports on Computer Systems
Technology, sept., p. 7.
[5] Matthew N.O. Sadiku, Sarhan M. Musa, and
OMonowo D. MoMOh, Cloud computing:
Opportunities and challenges, IEEE
potentials, pp. 34-36, January/February
2014.
[6] Virendra Singh Kushwah, Aradhana Saxena,
A Security approach for Data Migration in
Cloud Computing, 2013.
[7] http://www.thecloud.net.nz/go/what-is-cloud
-computing
[8] Ishwarya M.V, K.Ramesh Kumar, Secure
Anonymization for Privacy Measure, 2013.
[9] Grover Aman, Narang Winnie, 4-D
Password: Strengthening the Authentication
Scene, 2012.
[10] Deepika Singh, Puran Gour, Rajeev Thakur,
User Security in Cloud Using Password
Authentication, 2014.

More Related Content

What's hot

A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
IJERA Editor
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation technique
eSAT Journals
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
ijccsa
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
IRJET Journal
 
A study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloudA study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloud
eSAT Journals
 
A study on security responsibilities and adoption in
A study on security responsibilities and adoption inA study on security responsibilities and adoption in
A study on security responsibilities and adoption in
eSAT Publishing House
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
eSAT Publishing House
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
IJERA Editor
 
Protection of identity information in cloud computing without ttp
Protection of identity information in cloud computing without ttpProtection of identity information in cloud computing without ttp
Protection of identity information in cloud computing without ttp
Mithil Parab
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
 

What's hot (19)

A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation technique
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
A study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloudA study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloud
 
A study on security responsibilities and adoption in
A study on security responsibilities and adoption inA study on security responsibilities and adoption in
A study on security responsibilities and adoption in
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 
Ijetcas14 424
Ijetcas14 424Ijetcas14 424
Ijetcas14 424
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
 
Protection of identity information in cloud computing without ttp
Protection of identity information in cloud computing without ttpProtection of identity information in cloud computing without ttp
Protection of identity information in cloud computing without ttp
 
Paper2
Paper2Paper2
Paper2
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 

Viewers also liked

Scenario of Rural Electrification in India- Challenges and Impact
Scenario of Rural Electrification in India- Challenges and ImpactScenario of Rural Electrification in India- Challenges and Impact
Scenario of Rural Electrification in India- Challenges and Impact
IJERA Editor
 
H44084348
H44084348H44084348
H44084348
IJERA Editor
 
Instrumentation and Automation of Mechatronic
Instrumentation and Automation of MechatronicInstrumentation and Automation of Mechatronic
Instrumentation and Automation of Mechatronic
IJERA Editor
 
Real Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition SystemReal Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition System
IJERA Editor
 
Low Power CMOS Analog Multiplier
Low Power CMOS Analog MultiplierLow Power CMOS Analog Multiplier
Low Power CMOS Analog Multiplier
IJERA Editor
 
Structural Analysis of a wing box
Structural Analysis of a wing boxStructural Analysis of a wing box
Structural Analysis of a wing box
IJERA Editor
 
ANew Framework for Secure M-Commerce
ANew Framework for Secure M-CommerceANew Framework for Secure M-Commerce
ANew Framework for Secure M-Commerce
IJERA Editor
 
Ac044199202
Ac044199202Ac044199202
Ac044199202
IJERA Editor
 
Af044212215
Af044212215Af044212215
Af044212215
IJERA Editor
 
High Frequency Soft Switching Of PWM Boost Converter Using Auxiliary Resonant...
High Frequency Soft Switching Of PWM Boost Converter Using Auxiliary Resonant...High Frequency Soft Switching Of PWM Boost Converter Using Auxiliary Resonant...
High Frequency Soft Switching Of PWM Boost Converter Using Auxiliary Resonant...
IJERA Editor
 
E044052328
E044052328E044052328
E044052328
IJERA Editor
 
Static Analysis of G+2 Institutional Building in Bhopal
Static Analysis of G+2 Institutional Building in BhopalStatic Analysis of G+2 Institutional Building in Bhopal
Static Analysis of G+2 Institutional Building in Bhopal
IJERA Editor
 
Extract the ancient letters from decorated
Extract the ancient letters from decoratedExtract the ancient letters from decorated
Extract the ancient letters from decorated
IJERA Editor
 
Analysis of Process Parameters in Dry Turning of Medium Carbon Steel En19 by ...
Analysis of Process Parameters in Dry Turning of Medium Carbon Steel En19 by ...Analysis of Process Parameters in Dry Turning of Medium Carbon Steel En19 by ...
Analysis of Process Parameters in Dry Turning of Medium Carbon Steel En19 by ...
IJERA Editor
 
Fluid Structural Modal Coupled Numerical Investigation of Transonic Flutterin...
Fluid Structural Modal Coupled Numerical Investigation of Transonic Flutterin...Fluid Structural Modal Coupled Numerical Investigation of Transonic Flutterin...
Fluid Structural Modal Coupled Numerical Investigation of Transonic Flutterin...
IJERA Editor
 
Comparison of Performances of Spectral Based Approaches on Fabric Defect Dete...
Comparison of Performances of Spectral Based Approaches on Fabric Defect Dete...Comparison of Performances of Spectral Based Approaches on Fabric Defect Dete...
Comparison of Performances of Spectral Based Approaches on Fabric Defect Dete...
IJERA Editor
 
An Improved Parallel Activity scheduling algorithm for large datasets
An Improved Parallel Activity scheduling algorithm for large datasetsAn Improved Parallel Activity scheduling algorithm for large datasets
An Improved Parallel Activity scheduling algorithm for large datasets
IJERA Editor
 

Viewers also liked (20)

Scenario of Rural Electrification in India- Challenges and Impact
Scenario of Rural Electrification in India- Challenges and ImpactScenario of Rural Electrification in India- Challenges and Impact
Scenario of Rural Electrification in India- Challenges and Impact
 
H44084348
H44084348H44084348
H44084348
 
Instrumentation and Automation of Mechatronic
Instrumentation and Automation of MechatronicInstrumentation and Automation of Mechatronic
Instrumentation and Automation of Mechatronic
 
Real Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition SystemReal Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition System
 
Low Power CMOS Analog Multiplier
Low Power CMOS Analog MultiplierLow Power CMOS Analog Multiplier
Low Power CMOS Analog Multiplier
 
Structural Analysis of a wing box
Structural Analysis of a wing boxStructural Analysis of a wing box
Structural Analysis of a wing box
 
ANew Framework for Secure M-Commerce
ANew Framework for Secure M-CommerceANew Framework for Secure M-Commerce
ANew Framework for Secure M-Commerce
 
Ac044199202
Ac044199202Ac044199202
Ac044199202
 
Af044212215
Af044212215Af044212215
Af044212215
 
O046048187
O046048187O046048187
O046048187
 
High Frequency Soft Switching Of PWM Boost Converter Using Auxiliary Resonant...
High Frequency Soft Switching Of PWM Boost Converter Using Auxiliary Resonant...High Frequency Soft Switching Of PWM Boost Converter Using Auxiliary Resonant...
High Frequency Soft Switching Of PWM Boost Converter Using Auxiliary Resonant...
 
Q04606103106
Q04606103106Q04606103106
Q04606103106
 
E044052328
E044052328E044052328
E044052328
 
Static Analysis of G+2 Institutional Building in Bhopal
Static Analysis of G+2 Institutional Building in BhopalStatic Analysis of G+2 Institutional Building in Bhopal
Static Analysis of G+2 Institutional Building in Bhopal
 
Extract the ancient letters from decorated
Extract the ancient letters from decoratedExtract the ancient letters from decorated
Extract the ancient letters from decorated
 
Analysis of Process Parameters in Dry Turning of Medium Carbon Steel En19 by ...
Analysis of Process Parameters in Dry Turning of Medium Carbon Steel En19 by ...Analysis of Process Parameters in Dry Turning of Medium Carbon Steel En19 by ...
Analysis of Process Parameters in Dry Turning of Medium Carbon Steel En19 by ...
 
Fluid Structural Modal Coupled Numerical Investigation of Transonic Flutterin...
Fluid Structural Modal Coupled Numerical Investigation of Transonic Flutterin...Fluid Structural Modal Coupled Numerical Investigation of Transonic Flutterin...
Fluid Structural Modal Coupled Numerical Investigation of Transonic Flutterin...
 
Comparison of Performances of Spectral Based Approaches on Fabric Defect Dete...
Comparison of Performances of Spectral Based Approaches on Fabric Defect Dete...Comparison of Performances of Spectral Based Approaches on Fabric Defect Dete...
Comparison of Performances of Spectral Based Approaches on Fabric Defect Dete...
 
K046055662
K046055662K046055662
K046055662
 
An Improved Parallel Activity scheduling algorithm for large datasets
An Improved Parallel Activity scheduling algorithm for large datasetsAn Improved Parallel Activity scheduling algorithm for large datasets
An Improved Parallel Activity scheduling algorithm for large datasets
 

Similar to Password authentication in cloud

An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
IOSR Journals
 
H046053944
H046053944H046053944
H046053944
IJERA Editor
 
G0314043
G0314043G0314043
G0314043
iosrjournals
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
IOSR Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Publishing House
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
Raman Gill
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
ijcsa
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Sammer Qader
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
IJAAS Team
 
Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud Computing
Editor IJCATR
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
Rishabh Agarwal
 

Similar to Password authentication in cloud (20)

An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
H046053944
H046053944H046053944
H046053944
 
G0314043
G0314043G0314043
G0314043
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 
Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud Computing
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 

Recently uploaded

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 

Recently uploaded (20)

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 

Password authentication in cloud

  • 1. Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59 www.ijera.com 56 | P a g e Password authentication in cloud Indal Singh1 Rajesh Rai2 Sachin Murarkar3 M.Tech Scholar NRI Institute of Information Science & Technology Bhopal (M.P)-462021, India Abstract Cloud computing is an Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers [1]. Cloud Computing is a term used to describe both a platform and type of application. As a platform it supplies, configures and reconfigures servers, while the servers can be physical machines or virtual machines. On the other hand, Cloud Computing describes applications that are extended to be accessible through the internet and for this purpose large data centers and powerful servers are used to host the web applications and web services. Authentication is one the most important security primitive [6]. Password authentication is most widely used authentication mechanism. Password provides security mechanism for authentication and protection services against unwanted access to resource. In this paper, we applied a technique to preserve our password using graphical authentication. Keywords- Cloud computing, Sender, Receiver, Data security. I. Introduction User authentication is a fundamental component in most computer security contexts. It provides the basis for access control and user accountability [2]. When anyone wants to access the network, for security purposes every web application provides user authentication. From ancient day’s secret data or code is used for hiding and giving security to information. In user authentication the process which we have to pass through is username and password. Authentication process divided into Token based authentication, Biometric based authentication and Knowledge based authentication. Most of the web application provides knowledge based authentication which include alphanumeric password as well as graphical password. In today’s changing world when we are having number of networks and personal account some sort of easy authentication [3] schema need to be provided. II. Basics models of Cloud Computing Service Models of Cloud Computing: - According to NIST, the cloud model is composed of three service models: Software as a Service (SaaS): The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings [4]. Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application- hosting environment [4]. Infrastructure as a Service (IaaS): The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls) [4]. Deployment Models of Cloud Computing: - According to NIST, the cloud model is composed of four deployment models: Private cloud: The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the RESEARCH ARTICLE OPEN ACCESS
  • 2. Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59 www.ijera.com 57 | P a g e organization, a third party, or some combination of them, and it may exist on or off premises [4]. Community cloud: The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises [4]. Public cloud: The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider [4]. Figure 1 Service & delivery models in cloud Hybrid cloud: The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds) [4]. III. Classification of Authentication methods Authentication is a process of determining whether a particular individual or a device should be allowed to access a system or an application or simply an object running in a device. Authentication process assures the basic security goals, i.e. confidentiality and integrity. The first line of defense for protecting any resource is Authentication [8]. Authentication is a process of validating who you are to whom you claimed to be, or in other words a process of identifying an individual, usually based on a username and password. Currently what we have in the field, are the following set of techniques [9]: Human Authentication Techniques are as follows: 1. Knowledge Base (What you know) 2. Token Based (What you have) 3. Biometrics (What you are) 4. Recognition Based (What you recognize) Computer Authentication Techniques are as follows: 1. Textual Passwords 2. Graphical Passwords 3. Biometric schemes (fingerprints, voice recognition etc.) Figure 2 Classification of Authentication methods IV. Problem Formulated In this paper, we had proposed a method of password authentication by implementing double authentication technique. In the first step of authentication we apply the binary addition to our chosen username & in the second step we send the carry forward by OTP (One-Time Password) to the receiver, so as to decode the sent data.
  • 3. Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59 www.ijera.com 58 | P a g e V. Proposed Methodology Assigning the values: - First of all, we created a tree diagram in which left arm (i.e. left sub-tree) is assigned the value as 0 & right arm is assigned as 1. On the basis of values so obtained, we obtained a table. Figure 3 Tree diagram 1 = 0 2 = 00 3 = 01 4 = 000 5 = 001 6 = 011 7 = 010 8 = 0010 9 = 0100 Table1 Positions of numeric values Username calculation: - Enter username not more than 6 characters. Example Figure 4 Binary values of positions 1234 according to tree diagram For username 1234 1 2 3 4 0 00 01 000 Now, by adding the redundancy bits 1111 to the above generated bits, we get, 0 1111 00 1111 01 1111 000 Performing binary addition of the obtained binary value of the username: carry 1111111111111111 01111001111011111000 +11111111111111111111 101111001111011110111 The obtained result is 101111001111011110111. We will now the obtained bit to the receiver and send 1 of the first place of the data stream as OTP (One Time Password) to the mobile of the receiver for more secure authentication & the remaining 20 bits directly. When the user receives both the values, he knows what to do next. The receiver then add the carry 1 to the 20-bit received values to obtain the desired value. Here, 00000111(8-bit) and carry 1 will be added to get desired result. 111 01111001111011110111 +1 01111001111011111000 Thus, the decoded password is 01111001111011111000. Now, by removing the redundancy bits the original data is found i.e. 0 00 01 000 = 1 2 3 4 Figure 5 Working and flow of bits from sender to receiver Algorithm for sender: Step 1. Design tree for digit 1 to 9. Step 2. Start from 1, assign left sub-tree as 0 and right sub-tree as 1. Step 3. Repeat the procedure up to 9. Step 4. Enter the username. Step 5. Assign values to the digits in the username i.e. 1=0, 2=00, 3=01 etc. Step 6. Insert redundancy bits between the values of the username. Step 7. Now, perform the binary addition of the obtained data stream after adding redundancy bits. Step 8. Send the 20-bits directly to the receiver and the digit at the first place as OTP to the receiver’s mobile.
  • 4. Indal Singh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 1) September 2015, pp.56-59 www.ijera.com 59 | P a g e Figure 6 Flow chart for sender Algorithm for receiver: Step 1. Received data and OTP at receiver’s side. Step 2. Now, add this OTP bit to the received data stream of 20-bits. Step 3. By performing addition of OTP to the 20-bit data stream, we get the data stream with added redundancy. Step 4. Perform removal of redundancy bits from the original data. Step 5. Now, assigns values to the obtained original data. Step 6. Thus, the original data is found. Figure 7 Flow chart for receiver VI. CONCLUSION Lack of privacy and security is the main hurdle in the wide adoption of cloud computing. We are almost at the beginning of the cloud era; it is hard to predict the impact of cloud computing on society. Cloud computing is not fully mature and needs to be explored [4]. This technique provides more secure password authentication than usual graphical password authentication techniques. Moreover, the extra bit from the result which is sent as OTP adds more security to password authentication technique. References [1] Mishra, R. ; Sch. of Comput. Eng., KIIT Univ., Bhubaneswar, India ; Dash, S.K. ; Mishra, D.P. ; Tripathy, A., A privacy preserving repository for securing data across the cloud, 2011. [2] William Stallings and Lawrie Brown. Computer Security: Principle and Practices. Pearson Education, 2008. [3] Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice Susan Wiedenbeck Jim Waters College of IST Drexel University Philadelphia. [4] Peter Mell. (2011) 'The NIST Definition of Cloud', Reports on Computer Systems Technology, sept., p. 7. [5] Matthew N.O. Sadiku, Sarhan M. Musa, and OMonowo D. MoMOh, Cloud computing: Opportunities and challenges, IEEE potentials, pp. 34-36, January/February 2014. [6] Virendra Singh Kushwah, Aradhana Saxena, A Security approach for Data Migration in Cloud Computing, 2013. [7] http://www.thecloud.net.nz/go/what-is-cloud -computing [8] Ishwarya M.V, K.Ramesh Kumar, Secure Anonymization for Privacy Measure, 2013. [9] Grover Aman, Narang Winnie, 4-D Password: Strengthening the Authentication Scene, 2012. [10] Deepika Singh, Puran Gour, Rajeev Thakur, User Security in Cloud Using Password Authentication, 2014.