A Puzzle Based Authentication Scheme for Cloud Computing

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - December Issue 2013 by IJCTT Journal
Volume-6 Issue-4                           
Year of Publication : 2013
Authors :Sulochana.V , Parimelazhagan.R

MLA

Sulochana.V , Parimelazhagan.R"A Puzzle Based Authentication Scheme for Cloud Computing"International Journal of Computer Trends and Technology (IJCTT),V6(4):210-213 December Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- -This article presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user get authenticated and start accessing the cloud services. The article includes details of puzzle based authentication scheme are presented along with design, algorithm, security and implementation

References:-

[1].Daniela Elena, Popescu, Alina Madalina Lonea, An Hybrid Text-Image Based Authentication for Cloud Services, International Journal of Computer Communicaiton,CCC Publications, Vol 8(2), 2013,pp.263-274.
[2].Sulochana.V and R.Parimelazhagan, Implementing Graphical Password and Patternlock Security Using MVC into the Cloud Computing, International Journal of Computer Applications, Vol 79, Number 8,2013,pp.7-10.
[3].Dinesh.H.A and Dr.V.K.Agarwal, Multi Dimensional Password Generation Technique for Accessing Cloud Services, International Journal on Cloud Computing: Services and Architecture(IJCCSA), Vol.2,No.3,2012,pp.31-39.
[4].Grover Aman, Naran Winnie, 4-D password : Strengthening the Authentication Scene, International Journal of Scientific & Engineering Research, Vol.3,2012,pp.1-6.
[5].Dinesha H.A Multilevel Authentication Technique for Accessing Cloud Services, International Conference on Computing, Communication and Applications (ICCCA),2012, pp.1-4.
[6].Navnath D.Kale, Megha M.Nalgirkar, A Ample-Range Survey on Recall Based Graphical Password Authentication Based On Multi-Line Grid and Attack Patterns, International Journal of Science and Modern Engineering (IJISME),Vol.1,2013,pp.32-36.
[7]Rachna Singh Thakur, Shubham Pathak, Rupali Patil, Neha Kate, Aditi Badkul, Graphical Password (Puzzles) Authentication System, International Journal of Computer Architecture and Mobility(0082-0169),2012,Vol 1.
[8].Wazir Zada Khan, Mohammed Y Aalsalem and Yang Xiang, A Graphical Password Based System For Small Mobile Devices, International Journal of Computer Science Issues, Vol.8,No.2,2011,pp.145-154.
[9]John Charles Gyorffy, Andrew F.Tappenden, James Miller , Token Based Graphical Password Authentication, International Journal of Information Security, Vol 10,2011,pp.321-336.
[10].Ahmad Alomari,Appling Puzzle Encryption In the On-Demand Routing Protocols in Mobile Ad Hoc Networks (manets),Journal of Information Systems & Operations,2012.
[11].Sanjay K.Dhurandher, Mohammed S.Obaidat, Ankit Mahendru, Lakshaya Agnani, Puzzle Solving Based Authentication Method for Enhanced Security in Spins and Its Performance Evaluation, Proceedings of the 14th Communications and Networking Symposium,2011,pp.5-10.

Keywords:-Cloud Computing, Cloud Services, Graphical Password, Puzzle, Security