International Journal of Advances in Computer Science and Cloud Computing (IJACSCC)
Follow Us On :
current issues
Volume-10,Issue-2  ( Nov, 2022 )
Statistics report
Feb. 2023
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 18
Paper Published : 163
No. of Authors : 416
  Journal Paper

Paper Title :
Data Security In Cloud Using Password Generation Techniques

Author :S.A.Darade, Vaishnavi Deokar, Sayali Deshpande, Radhika Devkar

Article Citation :S.A.Darade ,Vaishnavi Deokar ,Sayali Deshpande ,Radhika Devkar , (2014 ) " Data Security In Cloud Using Password Generation Techniques " , International Journal of Advances in Computer Science and Cloud Computing (IJACSCC) , pp. 33-38, Volume-2,Issue-2

Abstract : Cloud computing is emerging field because of its performance, high availability, least cost and many others. Besides this companies are binding there business from cloud computing because the fear of data leakage. Due to lack of proper security control policy and weakness in safeguard which lead to much vulnerability in cloud computing. When organizations utilize cloud services; authenticating users in a trustworthy and manageable manner is a vital requirement. Organizations must address authentication related challenges such as credential management, strong authentication, delegated authentication, and managing trust across all types of cloud services. Users tend to choose memorable passwords that are easy for attackers to guess, but strong system assigned passwords are difficult for users to remember. Thus depending on the file parameters(C- Confidentiality, I- Integrity, A- Availability), we use textual password for lower privilege files, CCP passwords(Cued Clickpoint) for medium privilege files and PCCP password(Persuasive cued Clickpoint) for high privilege files. In this paper we focus on the integrated evaluation of the Persuasive Cued-Click Points graphical password authentication system, including usability and security. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space.

Type : Research paper

Published : Volume-2,Issue-2


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 91
| Published on 2014-11-01
IRAJ Other Journals
IJACSCC updates
IJACSCC Volume-10,Issue-2(Nov, 2022)
The Conference World


Warning: include(footer.php): failed to open stream: No such file or directory in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842

Warning: include(): Failed opening 'footer.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842