Secure data in cloud computing using face detection and fingerprint

N Chauhan, L Ahuja, SK Khatri - … International Conference on …, 2018 - ieeexplore.ieee.org
It is the delivery of computing services like storage, database, servers, software, networking
over the internet and you are charged for using cloud computing services as per our usage …

A survey on security techniques used for confidentiality in cloud computing

NA Patel - 2018 International Conference on Circuits and …, 2018 - ieeexplore.ieee.org
Cloud computing is one of biggest topic. In daily life large amount of data is created. To store
large amount of data, cloud computing is used. When storing the large amount of data in the …

Data security in cloud

VP Lalitha, MY Sagar, S Sharanappa… - … , Data Analytics and …, 2017 - ieeexplore.ieee.org
Cloud computing is moving increasingly to a destination with no return: the consolidation is
an essential tool for the future existence of the internet world. Cloud computing is used as …

Comparision study on various face detection techniques

K Srikrishnaswetha, S Kumar… - 2018 4th international …, 2018 - ieeexplore.ieee.org
Nowadays research has been developed by many security facilities such as fingerprint,
palm biometric and different biometrics. This information contains about comparisons of face …

Preventive measures to secure issues in cloud computing

A Varma, K Saxena, SK Khatri - 2019 International Conference …, 2019 - ieeexplore.ieee.org
This paper sheds light over the security issues and challenges in cloud computing and puts
emphasis on cloud computing service types and the different types of delivery along with …

[PDF][PDF] Biometric authentication using software as a service in cloud computing

S Gawade, A Bharti, A Raj, S Madane - Int. J. Eng. Comput. Sci, 2017 - academia.edu
Today many cloud users are facing the major problem of fake logging in and data theft. So it
is required to authenticate the cloud user that requests access to an account for providing …

[PDF][PDF] Biometric identification and authentication providence using fingerprint for cloud data access

AAM Bastina, N Rama - International Journal of Electrical and …, 2017 - academia.edu
The raise in the recent security incidents of cloud computing and its challenges is to secure
the data. To solve this problem, the integration of mobile with cloud computing, Mobile …

Prevention of personal data in cloud computing using bio-metric

AN Vinodhini, S Ayyasamy - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Objectives: To provide a security and efficient solution to end users to access their own
personal files in the cloud servers using biometric authentication. Methods: In this Minutiae …

Real Time Personal Data Protection Using Image Processing

PS Kumar, R Ranjith - 2021 12th International Conference on …, 2021 - ieeexplore.ieee.org
The use of personal mobile devices is increasing at a rapid rate due to digitalization of the
world. These devices are portable and can be used at various locations governing access to …

[PDF][PDF] Biometric Authentication using SaaS in Cloud Computing

KS Chand, BK Rani - … Journal of Engineering and Technology (IRJET …, 2018 - academia.edu
Now a day's cloud users are facing the major problem of fake logging in and data theft. So it
is required to authenticate the cloud user that requests access to an account for providing …