Password Generation Techniques for Accessing Cloud Services
Vaishnavi Deokar1, Sayali Deshpande2, Radhika Devkar3

1Vaishnavi Deokar, Computer Engineering, University Of Pune, Pune, India.
2Sayali Deshpande, Computer Engineering, University Of Pune, Pune, India.
3Radhika Devkar, Computer Engineering, University Of Pune, Pune, India.
Manuscript received on October 01, 2013. | Revised Manuscript Received on October 16, 2013. | Manuscript published on October 20, 2013. | PP: 54-59 | Volume-1, Issue-11, October 2013. | Retrieval Number: K03401011113/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering & Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Cloud computing is emerging field because of its performance, high availability, least cost and many others. Besides this companies are binding there business from cloud computing because the fear of data leakage. Due to lack of proper security control policy and weakness in safeguard which lead to many vulnerability in cloud computing.When organizations utilize cloud services, authenticating users in a trustworthy and manageable manner is a vital requirement. Organizations must address authentication related challenges such as credential management, strong authentication, delegated authentication, and managing trust across all types of cloud services. Users tend to choose memorable passwords that are easy for attackers to guess, but strong system assigned passwords are difficult for users to remember. Thus depending on the file parameters(CConfidentiality, I- Integrity, A- Availability), we use textual password for lower privilege files, CCP passwords(Cued Clickpoint) for medium privilege files and PCCP password(Persuasive cued Clickpoint) for high privilege files. In this paper we focus on the integrated evaluation of the Persuasive Cued-Click Points graphical password authentication system, including usability and security. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space.
Keywords: authentication, cued-click points, Graphical passwords, guessing attacks, persuasive technology.