The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Cloud Security Using Face Recognition
Abstract
Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.
Related Content
Dina Darwish.
© 2024.
28 pages.
|
Dina Darwish.
© 2024.
28 pages.
|
Muhammad Ahmed, Adnan Ahmad, Furkh Zeshan, Hamid Turab.
© 2024.
33 pages.
|
Pankaj Bhambri.
© 2024.
17 pages.
|
Kaushikkumar Patel.
© 2024.
20 pages.
|
Vijaya Kittu Manda, Arnold Mashud Abukari, Vivek Gupta, Madavarapu Jhansi Bharathi.
© 2024.
24 pages.
|
Pankaj Bhambri.
© 2024.
17 pages.
|
|
|