Loading

Security Implementation using Fingerprint and Face Recognition in Cloud
M. Aishwarya1, Linky Rani Rout C2, A. Sushrrutha Iyer3, Anwar Basha H4

1M. Aishwarya, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
2Linky Rani Rout C, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
3A. Sushrrutha Iyer, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
4Anwar Basha H, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
Manuscript received on 20 May 2019 | Revised Manuscript received on 06 June 2019 | Manuscript Published on 15 June 2019 | PP: 249-251 | Volume-8 Issue-1S2 May 2019 | Retrieval Number: A00570581S219/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud is the bunch of topographically associated system uncovering data. In cloud we store information on server side just as on customer side. Executing security become essential on customer side .Since, we have issue in record framework we need an incredible answer for beat the above notice issue. Client conduct profiling and fake innovation give and substitute approach to verify information. There are numerous calculation on client conduct and distraction innovation however nobody address the issue of productively conveying the imitation record in such a way the interrupt not ready to perceive the contrast among certified and bait document. we proposed a framework in which we are going to utilize the two innovation for example Client conduct profiling and bait innovation give.
Keywords: Cloud Computing, Data Security, User Behavior, Decoy Technology, Fingerprint Authentication, Face Recognition.
Scope of the Article: Cloud Computing