Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
A Composite Graph-Based User Verification System for Mobile Cloud Computing Settings
Author Name : Mr. Irungbam Lenin Singh, Mr. Adala Amarnath, Mr. Dannada Bhagyaraj Yadav
ABSTRACT In cloud computing systems, user identification is a crucial security prerequisite for resource access. One common method of user authentication that is still widely used today is a text-based password. Text passwords are hard to remember, though, so users are forced to write them down, which jeopardizes security. Graphical user authentication techniques have been put out as a substitute for traditional methods of user identity verification in recent times. Posting sensitive data on other servers that are not directly under their control and that can be accessed or handled by others is one of the biggest problems that cloud computing customers have. For portable cloud computing environments, this study suggests a hybrid graphical user authentication approach based on questions. The suggested plan has benefits over recall- and recognition-based methods while without storing any private data on cloud servers. The purpose of the survey and experimental study was to find out how satisfied users were with the usability and performance of the suggested scheme. The study's findings demonstrate that the suggested system is safe, simple to use, and impervious to common password attacks like brute force and shoulder surfing.