scholarly journals Biometric Approach for Confidentiality in Cloud Computing

Author(s):  
Pankaj Mishra ◽  
Dev Ratna Singh

Nowadays, progress in technology have made life simple by giving us higher levels of knowledge through the innovation of various devices. However, all technical invention harbours the potential of invisible threats to its users. One leading danger is theft of private information and data. As digital database get more prevailing, user’s attempt to prevent their data with extremely encrypted Identity cards and passwords. However, the abuse and theft of these security measures are on the rise. Taking benefit of security fault in Identity cards result in the cards gets duplicated and get misused. This increasing conflict of the cyber safety has lead to the start of biometric security method. Defining the main variation between the methods of biometric system used to verify user identity will focus on the benefits and limitations of personal data security systems.

Author(s):  
Pankaj Mishra ◽  
Dev Ratna Singh

Nowadays, progress in technology have made life simple by giving us higher levels of knowledge through the innovation of various devices. However, all technical invention harbours the potential of invisible threats to its users. One leading danger is theft of private information and data. As digital database get more prevailing, user’s attempt to prevent their data with extremely encrypted Identity cards and passwords. However, the abuse and theft of these security measures are on the rise. Taking benefit of security fault in Identity cards result in the cards gets duplicated and get misused. This increasing conflict of the cyber safety has lead to the start of biometric security method. Defining the main variation between the methods of biometric system used to verify user identity will focus on the benefits and limitations of personal data security systems.


2015 ◽  
Vol 14 (10) ◽  
pp. 6184-6189
Author(s):  
Himanshu Gupta ◽  
Kapil Chauhan

In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel try to secure their information by using highly encrypted passwords and authentication identities, but, the misuse and theft of these security measures are rising in lot of theft cases Taking advantage of security flaws in authentication identities ends up in cards being duplicated or counterfeited and hence misused. This increasing fight with cyber security has been the sole reason of  making  biometric security systems, the  important area of concern is that how do  one can implement the biometric security for increasing of data security.  First unique feature which is found different in every human is Fingerprints; Humans have used fingerprints for personal identification. Presently, most of the organisation use  fingerprint recognition for authentication process  it is one of the oldest and most commonly used biometrics, with high accuracy & generally easy and efficient and fast.  In this paper we propose the idea to use fingerprint recognition along with the user authentication password or to access the data or information. Since the only person who can access information is the person linked to it, no thief can gain access. It also makes your data, very hard for cyber criminals to hack into.


Author(s):  
Muzhir Shaban Al-Ani

The terms biometrics and biometry have been used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently biometrics refers to technologies and applications applied for personal identification using physical and behavioral parameters. Biometric security systems ensuring that only the authorized persons are permitted to access a certain data, because it is difficult to copy the biometric features pattern for a specific person. Biometrics is playing an important role in applications that are centric on identification, verification and classification. This chapter focuses on biometric security in their types, specifications, technologies and algorithms. Some algorithms of biometric security are also included in this chapter. Finally latest and future aspects of biometric system and merging technologies are also mentioned, including more details of system structures and specifications and what constitution will shape biometric security of in the future.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Information security is the protection of personal and non-personal data from various threats to guarantee privacy. For business practices, data security can reduce business risk, and increase the return of investment and business opportunities. In designing information system security systems, there are information security aspects that need to be considered. Many threats will come before the information circulating. Information is a matter that will be targeted by wild parties. Cryptographic algorithms are needed to protect data from these threats. Data Encryption Standard (DES) belongs to the symmetry cryptography system and is classified as a block cipher type. DES operates on 64-bit block size. DES encrypts 64 plaintext bits into 64-bit ciphertext using 56 private key bits or subkeys. The internal key is generated from an external key that is 64 bits long. The DES method is an excellent cryptographic technique used to secure data. DES has 16 rounds to ensure safer data against unexpected attacks. Applying DES to data encryption will be very useful for protecting data.


2020 ◽  
Vol 21 (2) ◽  
pp. 37
Author(s):  
Muhammad Arif Budiman ◽  
I Gusti Agung Widagda

Security systems that use passwords or identity cards can be hacked and misused. One of alternative security system is to use biometric identification. The biometric system that is popularly used is fingerprints, because the system is safe and comfortable. Fingerprints have a distinctive pattern for each individual and this makes fingerprints relatively difficult to fake, so the system is safe. Comfortable because the verification process is easily done. The problem that often occurs on the system of fingerprint scanner is found an error and the user has difficulty when accessing. To handle with these problems has developed an artificial intelligence system. One of arificial intelligence in pattern identification is artificial neural networks (ANN). From some of the results of previous research showed that the ANN method is reliable in pattern identification. Based on these facts, the method used in this research is the perceptron ANN method with values learning rate varying. In the research the program conducted by testing 20 samples showed that the performance of the perceptron ANN method is relatively good method in fingerprint image recognition. This can be indicated from the value of accuracy (0.95), precision (0.83), TP rate (1), and FP rate (0.07)). In addition, the location of the point coordinate (FP rate; TP rate) is (0.07; 1) in ROC graphs is located on the upper left (perfect classifier region).


2018 ◽  
Vol 3 (2) ◽  
pp. 85
Author(s):  
Chicherov K.A. ◽  
Norkina A. N.

This article presents issues of protecting confidential data, ways to support information security, types of information security threats resulting in an authorized access to confidential data, countermeasures and security measures to ensure confidential data security. Keywords: confidential data, information security, information security threat(s), personal data, information systems, data security.


Biometrics ◽  
2017 ◽  
pp. 1399-1418
Author(s):  
Muzhir Shaban Al-Ani

The terms biometrics and biometry have been used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently biometrics refers to technologies and applications applied for personal identification using physical and behavioral parameters. Biometric security systems ensuring that only the authorized persons are permitted to access a certain data, because it is difficult to copy the biometric features pattern for a specific person. Biometrics is playing an important role in applications that are centric on identification, verification and classification. This chapter focuses on biometric security in their types, specifications, technologies and algorithms. Some algorithms of biometric security are also included in this chapter. Finally latest and future aspects of biometric system and merging technologies are also mentioned, including more details of system structures and specifications and what constitution will shape biometric security of in the future.


Increased demand of Software and Applications offer intruders to perform malicious activities and exploit user’s personal data. Ignorance of security measures and tools while coding the software promotes the vulnerabilities and flaws. Developing a secure and bug free software is a big challenge for a developer and needs proper attention towards safety features. A single security mistake can lead to a loss of important information or confidential business data. Software companies and other organizations are looking for improved vulnerability security systems to narrow down the risk of vulnerabilities. Risks like social security attacks, bugs, phishing emails, vulnerabilities, virus attacks and more, hover over the IT industry. Threats are possible from all directions and in many different ways, so having an adequate vulnerability scoring mechanism is highly needed to reduce the risk of attacks. Identifying these threats before they get close enough to do damage is the most practical way to handle them. CVSS-V2 (Common Vulnerability Scoring System) is a standard for scoring the severity of vulnerabilities. CVSS-V2 uses three equations (Base, Temporal and Environmental) to capture and rate vulnerability severity. Numerous IT companies and government organizations rely on CVSS to evaluate and prioritize vulnerabilities. This paper proposes a method as an improvement over CVSS-V2 scoring system by introducing “Vulnerability type” in its base score equation.


2020 ◽  
pp. 34-37
Author(s):  
Viktor Mikhailovich Bisiukov

The urgency of the issue treated in this paper is determined by the fact that the federal law requires personal data operators to guarantee the safety of processed personal data by developing security systems based on a number of organizational and technical security measures, as well as their evaluation. When choosing the organisational and technical security measures, the problem of having to consider a large number of normative and procedural documents which regulate this process arises. The aim of this study is to develop the procedural guidelines for choosing and assessing the effectiveness of suggested organizational and technical security measures for data protection in personal data information systems.


2021 ◽  
Vol 4 (2) ◽  
pp. 89
Author(s):  
Lintang Bagas Adrianto ◽  
Mohammad Iwan Wahyuddin ◽  
Winarsih Winarsih

The development of technology in security systems combined with facial recognition, of course, makes every protected data safe. Many methods can be combined with a security system, one of which is the eigenface method, which is part of facial recognition. In this study, a personal data security system was built using Android-based deep learning. Based on the results of tests carried out on three devices with different Android versions, it is known, if on Android 8.1 (Oreo) the maximum distance is ± 40 cm, on Android 9.0 (Pie) the maximum distance is ± 50 cm, and on the Android version, 10.0 (Q) the maximum distance for facial object recognition is ± 60 cm. From the test results, it is known that by using the eigenface method, the farther the face is from the camera, the face cannot be detected. The implementation of this system is expected to protect personal data safely.Keywords:Face recognition, Deep Learning, Android, Eigenface.


Sign in / Sign up

Export Citation Format

Share Document