首页> 外文会议>Computing, Communication and Applications (ICCCA), 2012 International Conference on >Three tier data storage security in cloud using Face fuzzy vault
【24h】

Three tier data storage security in cloud using Face fuzzy vault

机译:使用Face Fuzzy Vault的云中三层数据存储安全性

获取原文
获取原文并翻译 | 示例

摘要

The well-known buzzword, say Cloud Computing, attracts the attention from both academy and industry across the world, because of its potential in achieving the long-held dream, say Utility Computing and opens a new era for new spawned companies to provide services above this new concept[6],[8]. At the same time hackers have also turned their faces to cloud to breach the security. The best software solution provides utilization of cloud computing and take full advantage of it with best security solutions and assurance. To achieve this goal proposed system provides the following solution, which uses three tier security in cloud environment. Set of biometric features are first extracted from user's face image, The extracted features are then quantized and mapped to binary representation for feature point matching. The produced features and the secret key (which will restrict unauthorized access) are bound using Face fuzzy vault scheme. During authentication key will be correctly retrieved if face vault matches. Also to prevent data from cloud service provider, data is encrypted while saving it on the cloud using Confidentiality, Integrity, Availability (CIA) values which will categorize data in three rings. While providing data if user is authorized then the concerned password gets extracted from the fuzzy vault and the extracted password will help to decide which user belongs to which data ring.
机译:Utility Computing表示,云计算这个著名的流行语吸引了全球学术界和业界的关注,因为它有潜力实现长期以来的梦想,并为新产生的公司提供新的服务提供了新的时代这个新概念[6],[8]。同时,黑客也将自己的面孔转向云,以破坏安全性。最好的软件解决方案可提供对云计算的利用,并通过最佳的安全解决方案和保证充分利用它。为实现此目标,建议的系统提供以下解决方案,该解决方案在云环境中使用三层安全性。首先从用户的面部图像中提取一组生物特征,然后对提取的特征进行量化并映射到二进制表示中,以进行特征点匹配。所产生的功能和秘密密钥(将限制未经授权的访问)使用Face Fuzzy Vault方案进行绑定。如果面部保险库匹配,则在身份验证期间将正确检索密钥。此外,为了防止来自云服务提供商的数据,使用机密性,完整性,可用性(CIA)值对数据进行加密,同时将其保存在云中,该值将数据分为三个环。在提供数据(如果用户被授权)的同时,会从模糊库中提取相关密码,并且提取的密码将有助于确定哪个用户属于哪个数据环。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号