•  
  •  
 

International Journal of Computer and Communication Technology

Abstract

The well-known buzzword, say Cloud Computing, attracts the attention from both academy and industry across the world, because of its potential in achieving the long-held dream, say Utility Computing and opens a new era for new spawned companies to provide services above this new concept[6],[8]. At the same time hackers have also turned their faces to cloud to breach the security. The best software solution provides utilization of cloud computing and take full advantage of it with best security solutions and assurance. To achieve this goal proposed system provides the following solution, which uses three tier security in cloud environment. Set of biometric features are first extracted from user’s face image, The extracted features are then quantized and mapped to binary representation for feature point matching. The produced features and the secret key (which will restrict unauthorized access) are bound using Face fuzzy vault scheme .During authentication key will be correctly retrieved if face vault matches. Also to prevent data from cloud service provider, data is encrypted while saving it on the cloud using Confidentiality, Integrity, Availability (CIA) values which will categorize data in three rings. While providing data if user is authorized then the concerned password gets extracted from the fuzzy vault and the extracted password will help to decide which user belongs to which data ring.

DOI

10.47893/IJCCT.2012.1137

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.