Authentication Cloud Computing using chunks of images

Muna Kheder Al-Naamee

Abstract


Data protecting cloud computing in nowadays become more important to prevent data from unauthorized access and stolen. Many techniques are used to improve authentication methods for achieving high security in cloud computing. For the authorization to access the cloud there are many existing techniques: textual password, biometrics, token based, recognition based. Each one of these techniques has its own advantages and disadvantages. This paper presents an improved way to implement a graphical password which contains a selection of chunks of images which are used to build password to provide a strong authentication. Hence, the proposed technique is used a chunks of images to provide strong password authentication.


Full Text:

PDF

Refbacks

  • There are currently no refbacks.