[go: up one dir, main page]

Chauhan et al., 2018 - Google Patents

Secure data in cloud computing using face detection and fingerprint

Chauhan et al., 2018

Document ID
14898180432764582977
Author
Chauhan N
Ahuja L
Khatri S
Publication year
Publication venue
2018 International Conference on Inventive Research in Computing Applications (ICIRCA)

External Links

Snippet

It is the delivery of computing services like storage, database, servers, software, networking over the internet and you are charged for using cloud computing services as per our usage. But it has it downfall also, the data which is uploaded on cloud can be hacked by some other …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
US10516527B1 (en) Split-key based cryptography system for data protection and synchronization across multiple computing devices
Anakath et al. Privacy preserving multi factor authentication using trust management
CN111147255B (en) Data security service system, method and computer readable storage medium
CN101310286B (en) Improved single sign on
WO2019043445A1 (en) Identity verification using biometric data and non-invertible functions via blockchain
US20210099304A1 (en) Composite identity authentication method and composite identity authentication system using same
Cheng et al. Identity based encryption and biometric authentication scheme for secure data access in cloud computing
WO2022053868A2 (en) Systems and methods for non-deterministic multi-party, multi-user sender-receiver authentication and non-repudiatable resilient authorized access to secret data
CN109076054A (en) System and method for managing the encryption key of single-sign-on application program
CN111954211A (en) Novel authentication key negotiation system of mobile terminal
Aloraini et al. A survey on data confidentiality and privacy in cloud computing
Albahdal et al. Problems and promises of using the cloud and biometrics
CN111538973A (en) Personal authorization access control system based on state cryptographic algorithm
Chauhan et al. Secure data in cloud computing using face detection and fingerprint
Jaichandran et al. Biometric based user authentication and privacy preserving in cloud environment
Wadhwa et al. Framework for user authenticity and access control security over a cloud
CN111970126A (en) Key management method and device
Dinesha et al. Evaluation of secure cloud transmission protocol
Raji et al. Enhancing Public Cloud Security by Developing a Model For User Authentication and Data Integrity Checking
Nguyen et al. Protecting biometrics using fuzzy extractor and non-invertible transformation methods in kerberos authentication protocol
Chakrawarti et al. The architechtural framework for public cloud security
Abdulatif et al. Improve Security of Cloud Storage by Using Third Parity Authentication, One Time Password and Modified AES Encryption Algorithm
Jain et al. Trending security mechanism in cloud computing
Habeeb et al. Proposed Secure Method for Web of Things Purposes
Pilania et al. ENCRYPTO: A Reliable and Efficient Mobile App for Password Management