{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T04:51:21Z","timestamp":1762145481586,"version":"3.41.2"},"reference-count":27,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T00:00:00Z","timestamp":1573862400000},"content-version":"vor","delay-in-days":319,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["108-2634-F-259-001"],"award-info":[{"award-number":["108-2634-F-259-001"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972205","61602253","U1836208","U1536206","U1836110","61672294"],"award-info":[{"award-number":["61972205","61602253","U1836208","U1536206","U1836110","61672294"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012246","name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>Text password systems are commonly used for identity authentication to access different kinds of data resources or services in cloud environment. However, in the text password systems, the main issue is that it is very hard for users to remember long random alphanumeric strings due to the long\u2010term memory limitation of the human brain. To address this issue, graphical passwords are accordingly proposed based on the fact that humans have better memory for images than alphanumeric strings. Recently, a Google map graphical password (GMGP) system is proposed, in which a specific location of Google Map is preset as a password for authentication. Unfortunately, the use of graphical passwords increases the risk of exposing passwords under shoulder\u2010surfing attacks. A snooper can easily look over someone\u2019s shoulder to get the information of a location on map than a text password from a distance, and thus the shoulder\u2010surfing attacks are more serious for graphical passwords than for text passwords. To overcome this issue, we design a polynomial\u2010based Google map graphical password (P\u2010GMGP) system. The proposed P\u2010GMGP system can not only resist the shoulder\u2010surfing attacks effectively, but also need much fewer challenge\u2010response rounds than the GMGP system for authentication. Moreover, the P\u2010GMGP system is extended to allow a user to be authenticated in cloud environment effectively and efficiently.<\/jats:p>","DOI":"10.1155\/2019\/2875676","type":"journal-article","created":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T23:30:32Z","timestamp":1573947032000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Polynomial\u2010Based Google Map Graphical Password System against Shoulder\u2010Surfing Attacks in Cloud Environment"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5641-7169","authenticated-orcid":false,"given":"Zhili","family":"Zhou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3881-7329","authenticated-orcid":false,"given":"Ching-Nung","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1131-2056","authenticated-orcid":false,"given":"Yimin","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7982-726X","authenticated-orcid":false,"given":"Xingming","family":"Sun","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2019,11,16]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-019-00684-y"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18072037"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.02.050"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2018.2813320"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2919570"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2906925"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3330139"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1561-7"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3151-8"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2866641"},{"key":"e_1_2_9_11_2","doi-asserted-by":"crossref","unstructured":"ZhangX. DouW. HeQ.et al. A generic framework for fast tree isolation based ensemble anomaly analysis Proceedings of the IEEE 33rd International Conference on Data Engineering May 2017 San Diego CA USA 983\u2013994.","DOI":"10.1109\/ICDE.2017.145"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3323926"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_2_9_14_2","first-page":"142","article-title":"Graphical password authentication using persuasive cued click point","volume":"2","author":"Iranna A. M.","year":"2013","journal-title":"International Journal of Advanced Research in Electrical Electronics & Instrumentation Engineering"},{"key":"e_1_2_9_15_2","doi-asserted-by":"crossref","unstructured":"WiedenbeckS. WatersJ. BirgetJ. C. BrodskiyA. andMemonN. Authentication using graphical passwords: effects of tolerance and image choice Proceedings of the Symposium on Usable Privacy and Security July 2005 Pittsburgh PA USA 1\u201312 https:\/\/doi.org\/10.1145\/1073001.1073002 2-s2.0-60649116908.","DOI":"10.1145\/1073001.1073002"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2053706"},{"key":"e_1_2_9_17_2","doi-asserted-by":"crossref","unstructured":"DirikA. E. MemonN. andBimergetJ.-C. Modeling user choice in the PassPoints graphical password sche Proceedings of the Symposium on Usable Privacy and Security July 2007 Pittsburgh PA USA 20\u201328.","DOI":"10.1145\/1280680.1280684"},{"key":"e_1_2_9_18_2","first-page":"84","article-title":"Security enhancement in shoulder surfing attacks using passpoints for random similar images (PRSIm)","volume":"2","author":"Meiappane A.","year":"2015","journal-title":"International Journal of Computer Networks and Applications"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2539942"},{"key":"e_1_2_9_20_2","doi-asserted-by":"crossref","unstructured":"ChiassonS. OorschotP. C. V. andBiddleR. Graphical password authentication using cued click points Proceedings of the European Symposium on Research in Computer Security September 2007 Dresden Germany 359\u2013374.","DOI":"10.1007\/978-3-540-74835-9_24"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0080-7"},{"key":"e_1_2_9_22_2","doi-asserted-by":"crossref","unstructured":"LiuX. QiuJ. MaL. GaoH. andRenZ. A novel cued-recall graphical password scheme Proceedings of the International Conference on Image and Graphics August 2011 Hefei China 949\u2013956 https:\/\/doi.org\/10.1109\/icig.2011.16 2-s2.0-80053023489.","DOI":"10.1109\/ICIG.2011.16"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.55"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.9790\/0661-1629124128"},{"key":"e_1_2_9_25_2","doi-asserted-by":"crossref","unstructured":"AljahdaliH. M.andPoetR. Challenge set designs and user guidelines for usable and secured recognition-based graphical passwords Proceedings of the IEEE 13th International Conference on Trust Security and Privacy in Computing and Communications September 2014 Beijing China 973\u2013982 https:\/\/doi.org\/10.1109\/TrustCom.2014.129 2-s2.0-84923066362.","DOI":"10.1109\/TrustCom.2014.129"},{"key":"e_1_2_9_26_2","first-page":"7","article-title":"A security class project in graphical passwords","volume":"26","author":"Spitzer J.","year":"2010","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"e_1_2_9_27_2","doi-asserted-by":"crossref","unstructured":"AumassonJ.-P. MeierW. andMendelF. Preimage attacks on 3-pass HAVAL and step-reduced MD5 Proceedings of the International Workshop on Selected Areas in Cryptography October 2008 Cincinnati OH USA 120\u2013135.","DOI":"10.1007\/978-3-642-04159-4_8"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/2875676.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/2875676.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2019\/2875676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:13:03Z","timestamp":1723032783000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2019\/2875676"}},"subtitle":[],"editor":[{"given":"Yuan","family":"Yuan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1155\/2019\/2875676"],"URL":"https:\/\/doi.org\/10.1155\/2019\/2875676","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"2019-09-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-10-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2875676"}}