Volume 13 | Number 1 | Year 2014 | Article Id. IJMTT-V13P505 | DOI : https://doi.org/10.14445/22315373/IJMTT-V13P505
Graph theory has many applications in computer science. But it can also be used to make the data secure. Sometime it is used in networking for many purposes. Cloud computing provide user many services like SAAS, IAAS and PAAS. But with many benefit still cloud providers are not too much confident about the security aspects. As for the data storage, cloud data center depends upon third party involvement. So there is need of an algorithm that can authenticate sender and receiver before any transaction between user and third party. The Proposed algorithm uses the adjacency matrix to make the data secure. OTP is one of the attractions used before any transaction.
[1] A Survey on Recognition-Based Graphical User Authentication Algorithms
[2] Authentication Using Graphical Passwords: Basic Results Susan Wiedenbeck Jim Waters ,College of IST Drexel University Philadelphia, PA, 19104 USA
[3] Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice Susan Wiedenbeck Jim Waters College of IST Drexel University Philadelphia
[4] Graphical Passwords, FABIAN MONROSE AND MICHAEL K. REITER, August 5, 2005 [5] N. Koblitz, “ Elliptic Curve Cryptosystems ”, Mathematics of Computation, vol. 48, pp. 203- 209, January 1987.
[6] Secure Storage and Access of Data in Cloud Computing Arjun Kumar , Byung Gook Lee, HoonJae Lee, Anu Kumari, ©2012 IEEE
[7] Security Analysis of Graphical Passwords over the Alphanumeric Passwords by G. Agarwal ,1Deptt.of Computer Science, IIET, Bareilly, India 2,3 Deptt. of Information Technology, IIET, Bareilly, India 27-11-2010
[8] V. Miller. “Uses of Elliptic Curves in cryptography”. RYPT’85, LNCS 218, pp 417-426, 1986.
[9] W. Stallings. Cryptography and Network Security: Principles and Practice. (3rd ed.). Prentice Hall, Upper Saddle River, New Jersey, 2003,
[10] Wassim Itani Ayman Kayssi Ali Chehab, “Privacy as a Service:Privacy-Aware Data Storage and Processing in Cloud Computing Architectures”, Eighth IEEE International Conference on Dependable, 2009.
Gurusharan Kaur, Dr. Rizwana Jamal, "Authenticate Communication with Adjacency Matrix using OTP(One Time Transaction) Method," International Journal of Mathematics Trends and Technology (IJMTT), vol. 13, no. 1, pp. 30-33, 2014. Crossref, https://doi.org/10.14445/22315373/IJMTT-V13P505