Chauhan et al., 2018 - Google Patents
Secure data in cloud computing using face detection and fingerprintChauhan et al., 2018
- Document ID
- 14898180432764582977
- Author
- Chauhan N
- Ahuja L
- Khatri S
- Publication year
- Publication venue
- 2018 International Conference on Inventive Research in Computing Applications (ICIRCA)
External Links
Snippet
It is the delivery of computing services like storage, database, servers, software, networking over the internet and you are charged for using cloud computing services as per our usage. But it has it downfall also, the data which is uploaded on cloud can be hacked by some other …
- 238000001514 detection method 0 title description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10516527B1 (en) | Split-key based cryptography system for data protection and synchronization across multiple computing devices | |
Anakath et al. | Privacy preserving multi factor authentication using trust management | |
CN111147255B (en) | Data security service system, method and computer readable storage medium | |
CN101310286B (en) | Improved single sign on | |
WO2019043445A1 (en) | Identity verification using biometric data and non-invertible functions via blockchain | |
US20210099304A1 (en) | Composite identity authentication method and composite identity authentication system using same | |
Cheng et al. | Identity based encryption and biometric authentication scheme for secure data access in cloud computing | |
WO2022053868A2 (en) | Systems and methods for non-deterministic multi-party, multi-user sender-receiver authentication and non-repudiatable resilient authorized access to secret data | |
CN109076054A (en) | System and method for managing the encryption key of single-sign-on application program | |
CN111954211A (en) | Novel authentication key negotiation system of mobile terminal | |
Aloraini et al. | A survey on data confidentiality and privacy in cloud computing | |
Albahdal et al. | Problems and promises of using the cloud and biometrics | |
CN111538973A (en) | Personal authorization access control system based on state cryptographic algorithm | |
Chauhan et al. | Secure data in cloud computing using face detection and fingerprint | |
Jaichandran et al. | Biometric based user authentication and privacy preserving in cloud environment | |
Wadhwa et al. | Framework for user authenticity and access control security over a cloud | |
CN111970126A (en) | Key management method and device | |
Dinesha et al. | Evaluation of secure cloud transmission protocol | |
Raji et al. | Enhancing Public Cloud Security by Developing a Model For User Authentication and Data Integrity Checking | |
Nguyen et al. | Protecting biometrics using fuzzy extractor and non-invertible transformation methods in kerberos authentication protocol | |
Chakrawarti et al. | The architechtural framework for public cloud security | |
Abdulatif et al. | Improve Security of Cloud Storage by Using Third Parity Authentication, One Time Password and Modified AES Encryption Algorithm | |
Jain et al. | Trending security mechanism in cloud computing | |
Habeeb et al. | Proposed Secure Method for Web of Things Purposes | |
Pilania et al. | ENCRYPTO: A Reliable and Efficient Mobile App for Password Management |