You are on page 1of 5

ABSTRACT Graphical Authentication System is one of the most secured formats of encryption of our Valuable Data.

In that authentication system gets vary in selecting a image and handling the particular image as an Password, Since because we need an e cellent authentication system we are going for an alternate model in which we apply some different techni!ues in enhancing a image as a password. Simply selecting a image and presenting them as a password will be definitely a wea"er one or it is possible that any "nown person or eavesdropper can identify the Password which may result in losing our own data. In order to overcome all the problems which leads us in losing our own data this pro#ect been developed with some different method in which password through images is not an identical one but entirely different one when compared with different login attempts, the variance in selecting the images at login times will provide us a very high security in encrypting the data overall. $e t passwords are the most commonly used techni!ue for authentication and have several drawbac"s. Graphical passwords provide a promising alternative to traditional alphanumeric passwords due to the fact that humans can remember pictures better than te t. In this paper, we propose a simple graphical password authentication system that consists of a se!uence of %n& images and the user have to select the clic" points associated with one of the %n& image in correct se!uence for successful login. $his authentication system employs the user&s personal handheld device as the second factor of authentication. 'ith the increasing popularity of handheld devices such as cell phones, our approach can be leveraged by many organi(ations to overcome threats such as "ey)loggers, shoulder surfing, wea" passwords. *ere instead of handheld devices we have set a verification code system which will be sent to the user registered mail)id from there on he can start using our encryption system once the mail)id is registered.

ACKNOWLEDGEMENT I e press my heartfelt than"s to Dr. M.SARAVANAKUMAR, Dean)+egional ,ffice, Anna -niversity +egional .entre .oimbatore, .oimbatore, for having provided me with the entire necessary infrastructure and other facilities to carry out this pro#ect.

I ta"e the pleasure to e press my gratitude to Dr. J.PREETHI, *ead, Department of .omputer Science and /ngineering, Anna -niversity +egional .entre .oimbatore, .oimbatore, for her degree of encouragement and moral support during the course of the pro#ect.

I than" my internal guide and Pro#ect .oordinator Mr. M.NEWLIN RAJKUMAR, Assistant Professor, Department of .omputer Science and /ngineering, Anna -niversity +egional .entre .oimbatore, .oimbatore, for his inspiring guidance and his valuable suggestions throughout the course of this pro#ect.

0y sincere than"s to all the teaching and non)teaching staff of our department and my friends for their valuable help and support throughout the pro#ect.

ii

LIST OF FIGURES

FIGURE NO 1.1 1.2 2.1 6.1 7.1 7.2 ,verview

TITLE

PAGE NO 1 3 67 68 97 76

$he *ybrid .loud Architecture Architecture of Si+i-S layered over 45S using the S5S tool"it /cosystem of .loud Security and Privacy System 0odel ,verall Architecture Diagram

iii

LIST OF ABBREVIATIONS ABBREVIATION A.: A., AV0 ;:S .*< .I5S .P) A;/ .P,P .P.SP DAG D;D* d);D*/ DoS DPDP /DoS 5*/ 5+. 5$P GA G; G*( G-I *I;/ *IPAA *$$P IaaS I;/ =D< DESCRIPTION Access Control List Ant Colony Optimi(ation Accountable Virtual Machine Boneh)Lynn)Shacham Canetti, Halevi, and Kat( Common Internet File System Cipherte t)Policy Attribute)Based Encryption Critical Path on a Processor Center Processing Unit Cloud Service Provider Direct Acyclic Graph Decisional)Bilinear Diffie)Hellman decisional)Bilinear Diffie)Hellman E ponent Deny of Service Dynamic PDP Economic Denial of Sustainability Fully Homomorphic Encryption Fraudulent Resource Consumption File Transfer Protocol Genetic Algorithm Giga Byte Giga Hert( Graphical User Interface Hierarchical Identity Based Encryption Health Insurance Portability and Accoun !"#$# % Act H#per e t Transfer Protocol Infrastructure !s ! Service Identity)Based Encryption Scheme Java Development Kid
iv

=+/ <P)A;/ :SSS 4AS 45S 44: P2P PaaS PDP P/$S P*I P<G P+/ PS, +: SA SaaS S5S Si+i-S S:A S0/s S,A $..P V0

Java Runtime Environment Key)Policy Attribute)Based Encryption Linear Secret Sharing Scheme Networ" Attached Storage Networ" File System Naor)Naor)Lotspiech Peer to Peer Platform !s ! Service Provable Data Possession Performance Effective Tas" Scheduling Protected Health Information Pac"age Pro y R&encryption Particle Swarm Optimi(ation Revocation List Simulated Annealing Software !s ! Service Super Fast Server Securing Remote Untrusted Storage Service Level Agreements Small and Medium Enterprises Service Oriented Architectures Trusted Cloud)Computing Platform Virtual Machine

You might also like