Effective Security Mechanism for Cloud Storage using Biometric System

Authors:

R. Kavitha,S.Pothumani,R. Ramya,

DOI NO:

https://doi.org/10.26782/jmcms.spl.2019.08.00008

Keywords:

Cloud Storage,Biometric System,Identity Management System,

Abstract

Biometric distinctive proof has clad to be more and more distinguished as these days. With the development of distributed computing, information proprietors are persuaded to re-appropriate the substantial size of biometric details and distinctive evidential duty to the cloud to lose the pricey capability and computational prices that anyway conveys potential dangers to clients' security. During this paper, we have a tendency to propose a productive and security safeguarding biometric ID redistributing arrange. Particularly, the biometric information is encoded and redistributed to the cloud server. To carry out biometric recognizable evidence, the information proprietor encodes the question information and handover to the cloud. The cloud discharge distinctive proof activities over the disorganized information and gave the final outcome to the database proprietor. A thoroughgoing security investigation shows the projected arrange is secure irrespective of whether or not aggressors will manufacture recognizable proof demands and intrigue with the cloud. Dissimilar and gone by customs, trial results demonstrate the projected plan fulfill a superior outcome in each coming up with and distinctive proof methodology.

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “ Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
IV. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
V. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VI. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VII. Priya, N.,Sridhar,J.,Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
VIII. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue2. April – June 2016

 

View | Download