Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

PassVaRRdS - Password Generator, Encrypting and Storage using AES and Cloud

View through CrossRef
The users of computer technology and internet are increasing day by day. As the users are growing, the need for security is also felt very much. The data assets and other valuable facts are stored in the computer systems. One of the ways to safe guard the data assets is to have a proper authorization method to access the data. This is achieved by user identification and password mechanism. The selection of password is important, since the entire authorization is dependent on the password. The password needs to be strong enough to avoid brute force attack and other attacks. Also remembering complicated passwords or passwords of multiple accounts can be much hectic, thus we need a way to store or save the password securely. It should also be kept in mind that the passwords should be easily accessible to the user but cannot be breached by others. So we are using Advanced Encryption Standard algorithm to safely encrypt the passwords and store the encrypted passwords in the cloud database.
Title: PassVaRRdS - Password Generator, Encrypting and Storage using AES and Cloud
Description:
The users of computer technology and internet are increasing day by day.
As the users are growing, the need for security is also felt very much.
The data assets and other valuable facts are stored in the computer systems.
One of the ways to safe guard the data assets is to have a proper authorization method to access the data.
This is achieved by user identification and password mechanism.
The selection of password is important, since the entire authorization is dependent on the password.
The password needs to be strong enough to avoid brute force attack and other attacks.
Also remembering complicated passwords or passwords of multiple accounts can be much hectic, thus we need a way to store or save the password securely.
It should also be kept in mind that the passwords should be easily accessible to the user but cannot be breached by others.
So we are using Advanced Encryption Standard algorithm to safely encrypt the passwords and store the encrypted passwords in the cloud database.

Related Results

Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on...
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Penelitian ini mengembangkan aplikasi berbasis Python untuk mengevaluasi kekuatan password serta memberikan rekomendasi password yang lebih aman menggunakan alfabet fonetik NATO, T...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
User password repetitive patterns analysis and visualization
User password repetitive patterns analysis and visualization
Purpose– Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical t...
Assessing Security with Regard to Cloud Applications in STEM Education
Assessing Security with Regard to Cloud Applications in STEM Education
There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to m...
Analisa Pengaruh Tegangan Harmonik Terhadap Regulasi Tegangan Eksitasi Generator Satu Fasa
Analisa Pengaruh Tegangan Harmonik Terhadap Regulasi Tegangan Eksitasi Generator Satu Fasa
Esensinya setiap generator listrik satu fasa maupun tiga fasa telah dilengkapi dengan sistem eksitasi. Sistem eksitasi generator ada tiga, yaitu sistem eksitasi statis, dinamis, da...
A Unified Model for Cloud Data Confidentiality
A Unified Model for Cloud Data Confidentiality
Cloud computing is a developing technology which gets more attention from both the industries and academia. The cloud storage is one of the main benefit in cloud computing, which i...
Minimum Adversarial Examples
Minimum Adversarial Examples
Deep neural networks in the area of information security are facing a severe threat from adversarial examples (AEs). Existing methods of AE generation use two optimization models: ...

Back to Top