An Android Based Secure Access Control Using ARM and Cloud Computing

被引:0
|
作者
Srividhya, K. [1 ]
Manikanthan, S. V. [1 ]
机构
[1] Dr Pauls Engn Coll, Dept Elect & Commun Engn, Villupuram, India
关键词
authentication; cloud computing; enrollment and identification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Biometrics in the cloud infrastructure improves the security of the system. The physical characters in biometrics are finger print, facial structure, iris pattern, voice, etc. Any of these characters are given to identify the persons and authenticate them. This paper describes the enrollment and identification for the system which allows the accessing of person's well known by the higher officials. The physical behaviors are scanned by using android mobile phone. The enroll and recognize operation are achieved with the help of cloud computing. LPC2148 is ARM processor used for controlling the overall system. The primary goal is to achieve the best security to the system and reliable. In this system, there is no need for password.
引用
收藏
页码:1480 / 1483
页数:4
相关论文
共 50 条
  • [1] A Secure Cloud Computing System by Using Encryption and Access Control Model
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (03): : 538 - 549
  • [2] New secure access control model for cloud computing based on Chaotic systems
    BenMbarak, Omessead
    Naanaa, Anis
    ElAsmi, Sadok
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 1485 - 1490
  • [3] Biometric based authentication and access control techniques to secure Mobile Cloud Computing
    Khatri, Sunil Kumar
    Monica
    Vadi, Vikas Rao
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 371 - 377
  • [4] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Chen, Tzer-Shyong
    Liu, Chia-Hui
    Chen, Tzer-Long
    Chen, Chin-Sheng
    Bau, Jian-Guo
    Lin, Tzu-Ching
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 4005 - 4020
  • [5] Provably Secure Data Access Control Protocol for Cloud Computing
    Zhang, Ji
    Chen, Anmin
    Zhang, Ping
    SYMMETRY-BASEL, 2023, 15 (12):
  • [6] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [7] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Tzer-Shyong Chen
    Chia-Hui Liu
    Tzer-Long Chen
    Chin-Sheng Chen
    Jian-Guo Bau
    Tzu-Ching Lin
    Journal of Medical Systems, 2012, 36 : 4005 - 4020
  • [8] Time efficient secure DNA based access control model for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    Vijayakumar, Pandi
    Audithan, Sivaraman
    Balusamy, Balamurugan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 90 - 105
  • [9] Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing
    Wu, Qing
    Li, Liangjun
    Zhang, Leyou
    Mu, Yi
    Rezaeibagha, Fatemeh
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5533 - 5543
  • [10] Redesigning Secure Element Access Control for NFC Enabled Android Smartphones using Mobile Trusted Computing
    Anwar, Waqar
    Lindskog, Dale
    Zavarsky, Pavol
    Ruhl, Ron
    INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2013), 2013, : 27 - 34