2020
DOI: 10.1088/1757-899x/981/2/022043
|View full text |Cite
|
Sign up to set email alerts
|

A Coherent and Privacy-Protecting Biometric Authentication Strategy in Cloud Computing

Abstract: The Biometric authentication has become progressively more desired in current years. With this expansion of cloud computing, database holders be influenced to expand this extensive volume of biometric information & detection operations to CLOUD for eradicate of this high-priced storage and result overheads, is still conveys possible dangers to users’ seclusion. In this document, we recommend an well-organized, well planned and confidentiality-protecting biometric classification strategy. Particularly, biom… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 62 publications
(2 citation statements)
references
References 12 publications
0
1
0
Order By: Relevance
“…The most common authentication methods are text passwords [2], Identification Numbers (PIN) [3], and biometrics [4]. Hence, protecting a system requires a sufficient, reliable, and vigorous authentication framework [5].…”
Section: Introductionmentioning
confidence: 99%
“…The most common authentication methods are text passwords [2], Identification Numbers (PIN) [3], and biometrics [4]. Hence, protecting a system requires a sufficient, reliable, and vigorous authentication framework [5].…”
Section: Introductionmentioning
confidence: 99%
“…Biometric identification has gained increasing popularity owing to its positive approach toward user authentication. When compared to standard authentication techniques done with keys and identification cards, BA is evaluated to be more genuine and appropriate (Yadav et al, 2020). Since modalities, namely faces, fingerprints, palm vein irises, hand geometry, and voices are truly unique, the usage of biometrics is increasing each day, which makes them an effectual blockade to cyber criminals trying to underhandedly impersonate us (Carmel & Akila, 2020).…”
Section: Introductionmentioning
confidence: 99%