DOIONLINE

DOIONLINE NO - IJACSCC-IRAJ-DOIONLINE-1422

Publish In
International Journal of Advances in Computer Science and Cloud Computing (IJACSCC)-IJACSCC
Journal Home
Volume Issue
Issue
Volume-2,Issue-2  ( Nov, 2014 )
Paper Title
Data Security In Cloud Using Password Generation Techniques
Author Name
S.A.Darade, Vaishnavi Deokar, Sayali Deshpande, Radhika Devkar
Affilition
Department Of Computer Engineering SITS, Narhe, Pune, India
Pages
33-38
Abstract
Cloud computing is emerging field because of its performance, high availability, least cost and many others. Besides this companies are binding there business from cloud computing because the fear of data leakage. Due to lack of proper security control policy and weakness in safeguard which lead to much vulnerability in cloud computing. When organizations utilize cloud services; authenticating users in a trustworthy and manageable manner is a vital requirement. Organizations must address authentication related challenges such as credential management, strong authentication, delegated authentication, and managing trust across all types of cloud services. Users tend to choose memorable passwords that are easy for attackers to guess, but strong system assigned passwords are difficult for users to remember. Thus depending on the file parameters(C- Confidentiality, I- Integrity, A- Availability), we use textual password for lower privilege files, CCP passwords(Cued Clickpoint) for medium privilege files and PCCP password(Persuasive cued Clickpoint) for high privilege files. In this paper we focus on the integrated evaluation of the Persuasive Cued-Click Points graphical password authentication system, including usability and security. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space.
  View Paper