SlideShare a Scribd company logo
A Seminar
on
Accessing Cloud Services Using Graphical
Password Authentication
Presented by:
Students B.E.(Computer)
1) Valvi Alpesh N.
2) Tambe Datta S.
3) Birdawade Suraj E.
4) Bomble Puja S.
Guided by:-
Prof. S. A. Gade
CONTENTS
 Introduction
 Overview of the authentication methods
 Existing System
 Proposed System
 Advantages
 Disadvantages
 Applications
 Conclusion
INTRODUCTION
 What is Cloud ?
 Cloud Services
 Need of password for Cloud.
 Use Of Graphical Password.
OVERVIEW OF THE AUTHENTICATION METHODS
 Token based authentication.
 Biometric based authentication.
 Knowledge based authentication.
EXISTING SYSTEM
Triangle Scheme
SIGNATURE BASED SCHEME
PROPOSED SYSTEM
FLOWCHART
ADVANTAGES
 High security than alphanumeric password
 Easy to remember
 User Interface
APPLICATIONS
 In Cloud computing environment.
 Social networking sites.
 In all registration form.
CONCLUSION
 Graphical Passwords are alternative to textual
alphanumeric passwords.
 Easy to remember.
 Hard to guess.
REFERENCES
 A Survey on Recognition-Based Graphical User
Authentication Algorithms FarnazTowhidi Centre for
Advanced Software Engineering, University Technology
Malaysia Kuala Lumpur, Malaysia
 Authentication Using Graphical Passwords: Basic Results
Susan Wiedenbeck Jim Waters ,College of IST Drexel
University Philadelphia, PA, 19104 USA
 Graphical Passwords,FABIAN MONROSE AND MICHAEL K.
REITER, August 5, 2005
 A Survey on Recognition-Based Graphical User
Authentication Algorithms
Graphical password

More Related Content

Graphical password

  • 1. A Seminar on Accessing Cloud Services Using Graphical Password Authentication Presented by: Students B.E.(Computer) 1) Valvi Alpesh N. 2) Tambe Datta S. 3) Birdawade Suraj E. 4) Bomble Puja S. Guided by:- Prof. S. A. Gade
  • 2. CONTENTS  Introduction  Overview of the authentication methods  Existing System  Proposed System  Advantages  Disadvantages  Applications  Conclusion
  • 3. INTRODUCTION  What is Cloud ?  Cloud Services  Need of password for Cloud.  Use Of Graphical Password.
  • 4. OVERVIEW OF THE AUTHENTICATION METHODS  Token based authentication.  Biometric based authentication.  Knowledge based authentication.
  • 9. ADVANTAGES  High security than alphanumeric password  Easy to remember  User Interface
  • 10. APPLICATIONS  In Cloud computing environment.  Social networking sites.  In all registration form.
  • 11. CONCLUSION  Graphical Passwords are alternative to textual alphanumeric passwords.  Easy to remember.  Hard to guess.
  • 12. REFERENCES  A Survey on Recognition-Based Graphical User Authentication Algorithms FarnazTowhidi Centre for Advanced Software Engineering, University Technology Malaysia Kuala Lumpur, Malaysia  Authentication Using Graphical Passwords: Basic Results Susan Wiedenbeck Jim Waters ,College of IST Drexel University Philadelphia, PA, 19104 USA  Graphical Passwords,FABIAN MONROSE AND MICHAEL K. REITER, August 5, 2005  A Survey on Recognition-Based Graphical User Authentication Algorithms