z-logo
open-access-imgOpen Access
Biometric Mobile Data on Secure Public Cloud Vulnerabilities
Author(s) -
Vengatesan Venugopal,
Rao Gudlur,
@ Saigopal,
Sundresan Perumal
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.b1059.0782s219
Subject(s) - computer science , computer security , cloud computing , password , cloud computing security , authentication (law) , access control , internet privacy , operating system
Companies who are implementing the cloud solutions have increased numerous advantages in the recent years. Cloud solutions provide a very few preferences, for example, portability, adaptability and costs funds. Alongside the numerous advantages that distributed computing offers the security challenges that it presents are similarly striking. The two essential capacities for secure cloud administration are character administration and access control in distributed computing, the current methodologies for client confirmation depend on accreditation that are put together by the client. These accreditations incorporate passwords, tokens and computerized authentications. Most of the cases unapproved access by outsiders, for example, programmers likewise exist and simple for information control and abuse. In any case, the most serious issue with this methodology is that the presence of such many secret phrase account pairings for each individual client prompts either overlooked passwords or utilizing a similar mix for different locales. Security issue is significant concern, region of research in versatile distributed computing and clients. Shielding the remote information and applications from any ill-conceived get to remain an essential security worry in portable distributed computing. This paper explains about secure bio metric and face recognized based authentication protocol which is best suited for the public cloud environment to improve the safer and secure user authentication process. The above strategy will anchor approved clients as well as keep the cloud suppliers can't get in to the information and data access.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here