Nothing Special   »   [go: up one dir, main page]

Kumar et al., 2018 - Google Patents

Privacy preserving security using biometrics in cloud computing

Kumar et al., 2018

View PDF
Document ID
12695540438423302543
Author
Kumar S
Singh S
Singh A
Tiwari S
Singh R
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

Cloud computing and the efficient storage provide new paradigms and approaches designed at efficiently utilization of resources through computation and many alternatives to guarantee the privacy preservation of individual user. It also ensures the integrity of stored …
Continue reading at www.ir.juit.ac.in:8080 (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
Kumar et al. Privacy preserving security using biometrics in cloud computing
Liu et al. Finger vein secure biometric template generation based on deep learning
Joseph et al. Retracted article: a multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment
Gumaei et al. Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation
Haghighat et al. CloudID: Trustworthy cloud-based and cross-enterprise biometric identification
Wang et al. Inference-based similarity search in randomized montgomery domains for privacy-preserving biometric identification
El-Hameed et al. Cancelable biometric security system based on advanced chaotic maps
Verma et al. A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment.
Gayathri et al. Novel framework for multimodal biometric image authentication using visual share neural network
Ramasamy et al. Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application
Moradi et al. A Real‐Time Biometric Encryption Scheme Based on Fuzzy Logic for IoT
Ghani et al. Toward robust and privacy-enhanced facial recognition: A decentralized blockchain-based approach with GANs and deep learning
CN110535630B (en) Key generation method, device and storage medium
Gayathri et al. Fisher-Yates chaotic shuffling based visual cryptography scheme for multimodal biometric authentication
Chandrasekhar et al. A noval method for cloud security and privacy using homomorphic encryption based on facial key templates
Wang et al. Joint Biological ID: A Secure and Efficient Lightweight Biometric Authentication Scheme
Jasmine et al. A privacy preserving based multi-biometric system for secure identification in cloud environment
Verma et al. A novel model to enhance the data security in cloud environment
Morampudi et al. Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server
Siddhad et al. Cancelable biometric template generation using convolutional autoencoder
Bhargav-Spantzel et al. Biometrics-based identifiers for digital identity management
US11501580B1 (en) Methods and systems for implementing secure biometric recognition
WO2021106334A1 (en) Key generation device, key utilization device, and key generation method
Poonia et al. Upgrading information security and protection for palm-print templates
Venkatachalam et al. Securing Data in the Cloud: The Application of Fuzzy Identity Biometric Encryption for Enhanced Privacy and Authentication