Kumar et al., 2018 - Google Patents
Privacy preserving security using biometrics in cloud computingKumar et al., 2018
View PDF- Document ID
- 12695540438423302543
- Author
- Kumar S
- Singh S
- Singh A
- Tiwari S
- Singh R
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
Cloud computing and the efficient storage provide new paradigms and approaches designed at efficiently utilization of resources through computation and many alternatives to guarantee the privacy preservation of individual user. It also ensures the integrity of stored …
- 230000001815 facial 0 abstract description 81
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | Privacy preserving security using biometrics in cloud computing | |
Liu et al. | Finger vein secure biometric template generation based on deep learning | |
Joseph et al. | Retracted article: a multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment | |
Gumaei et al. | Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation | |
Haghighat et al. | CloudID: Trustworthy cloud-based and cross-enterprise biometric identification | |
Wang et al. | Inference-based similarity search in randomized montgomery domains for privacy-preserving biometric identification | |
El-Hameed et al. | Cancelable biometric security system based on advanced chaotic maps | |
Verma et al. | A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment. | |
Gayathri et al. | Novel framework for multimodal biometric image authentication using visual share neural network | |
Ramasamy et al. | Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application | |
Moradi et al. | A Real‐Time Biometric Encryption Scheme Based on Fuzzy Logic for IoT | |
Ghani et al. | Toward robust and privacy-enhanced facial recognition: A decentralized blockchain-based approach with GANs and deep learning | |
CN110535630B (en) | Key generation method, device and storage medium | |
Gayathri et al. | Fisher-Yates chaotic shuffling based visual cryptography scheme for multimodal biometric authentication | |
Chandrasekhar et al. | A noval method for cloud security and privacy using homomorphic encryption based on facial key templates | |
Wang et al. | Joint Biological ID: A Secure and Efficient Lightweight Biometric Authentication Scheme | |
Jasmine et al. | A privacy preserving based multi-biometric system for secure identification in cloud environment | |
Verma et al. | A novel model to enhance the data security in cloud environment | |
Morampudi et al. | Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server | |
Siddhad et al. | Cancelable biometric template generation using convolutional autoencoder | |
Bhargav-Spantzel et al. | Biometrics-based identifiers for digital identity management | |
US11501580B1 (en) | Methods and systems for implementing secure biometric recognition | |
WO2021106334A1 (en) | Key generation device, key utilization device, and key generation method | |
Poonia et al. | Upgrading information security and protection for palm-print templates | |
Venkatachalam et al. | Securing Data in the Cloud: The Application of Fuzzy Identity Biometric Encryption for Enhanced Privacy and Authentication |