Название | Deep Learning Approaches to Cloud Security |
---|---|
Автор произведения | Группа авторов |
Жанр | Отраслевые издания |
Серия | |
Издательство | Отраслевые издания |
Год выпуска | 0 |
isbn | 9781119760504 |
1.6 Future Scope
Biometrics pose danger to individual rights and privacy since technologies like facial recognition allow identification of citizens without their acknowledgement. Moreover, when consent is backed into the design of the technology, the privacy concerns regarding biometrics could be addressed [16].
Any modern technology is laden with concealed threats with no claim of infallibility either by the software maker, person selling it, or the one who advocates its deployment. In the context of criminal justice administration research, it indicates that images captured with default camera settings preferably expose fair complexion rather than dark, affecting results of Facial Recognition Technology across racial groups. One methodology might be to utilize a technology-neutral regulatory framework that identifies degrees of damages.
1.7 Conclusion
Biometric technologies have wide-ranging applications. They are being increasingly used every day for phone security, banks, and governments looking towards these technologies as security measures for verifying transactions. Important government organizations are using facial recognition technology to create databases using driver’s license and passport details for effective administration, socio-economic development, and law enforcement. The thought that refined innovation implies more prominent proficiency should be fundamentally dissected. As these technologies penetrate more and more into our everyday lives, it is imperative to know and be educated about them. A reasonable strategy with ample safeguards for data protection and privacy is the need of the hour.
References
1. A.K. Jain and K. Nandakumar, “Biometric Authentication: System Security and User Privacy, “IEEE Published by the IEEE Computer Society, 00189162/12, Nov 2012.
2. Abhishek Kumar & Jyotir Moy Chatterjee & Pramod Singh Rathore, 2020. “Smartphone Confrontational Applications and Security Issues,” International Journal of Risk and Contingency Management (IJRCM), IGI Global, vol. 9(2), pages 1-18, April.
3. Bhargava, N., Bhargava, R., Rathore, P. S., & Kumar, A. (2020). Texture Recognition Using Gabor Filter for Extracting Feature Vectors With the Regression Mining Algorithm. International Journal of Risk and Contingency Management (IJRCM), 9(3), 31-44. doi:10.4018/IJRCM.2020070103.
4. Chandra Shekharv Vorugunti, “A Secure and efficient Biometric Authentication as a service for cloud computing,” 1 IEEE, October 09-11, 2014.
5. G.R Mettu and A. Patil, “Data Breaches as top Security concerns in Cloud Computing”, International Journal of Pure and Applied Mathematics, 119(14):19-27,2018.
6. Haryatibinti Jaafar, Nordianabinti, Mukahar, Dzati Athiarbinti Ramli “A Methodology of Nearest Neighbor: Design and Comparison of Biometric Image Database” IEEE Student Conference on Research and Development, 2016.
7. Indu, P.M Rubesh Anand and V.Bhaskar, “Identity and Access management in Cloud Environment :Mechanisms and Challenges,” Elsevier Engineering Science and Technology, an International Journal 21 (2018) 574-588, 2018.
8. K Sarat Chand and Dr. B Kezia. Rani, “Biometric Authentication using SaaS in Cloud Computing,” International Research Journal of Engineering and Technology (IRJET), Volume: 05 Issue: 02, Feb-2018.
9. Kumar, A., Chatterjee, J. M., & Díaz, V. G. (2020). A novel hybrid approach of svm combined with nlp and probabilistic neural network for email phishing. International Journal of Electrical and Computer Engineering, 10(1), 486
10. N. Bhargava, S. Dayma, A. Kumar and P. Singh, “An approach for classification using simple CART algorithm in WEKA,” 2017 11th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, 2017, pp. 212–216, doi: 10.1109/ISCO.2017.7855983.
11. Naveen Kumar, Prakarti Triwedi, Pramod Singh Rathore, “An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC)”, First International Conference on Information Technology and Knowledge Management pp. 89–92, ISSN 2300-5963 ACSIS, Vol. 14 DOI: 10.15439/2018KM19.
12. Rathore, P.S., Chatterjee, J.M., Kumar, A. et al. Energy-efficient cluster head selection through relay approach for WSN. J Supercomput (2021). https://doi.org/10.1007/s11227-020-03593-4
13. S. Bawaskar and M. Verma, “Enhanced SSO based MultiFactor Authentication for Web Security”, International Journal of Computer Science and Information Technologies, Vol. 7 (2), 2016, 960-966, 2016.
14. S. Ziyad and A. Kannammal, ”A Multifactor Biometric Authentication for the Cloud”, Springer India, Computational Intelligence, Cyber Security and Computational Models, Advances in Intelligent Systems and Computing 246, 2014.
15. Singh Rathore, P., Kumar, A., & Gracia-Diaz, V. (2020). A Holistic Methodology for Improved RFID Network Lifetime by Advanced Cluster Head Selection using Dragonfly Algorithm. International Journal Of Interactive Multimedia And Artificial Intelligence, 6 (Regular Issue), 8. http://doi.org/10.9781/ijimai.2020.05.003.
16. Thangapandiyan, M., Anand, P.M., & Sankaran, K. (2018). Quantum Key Distribution and Cryptography Mechanisms for Cloud Data Security. 2018 International Conference on Communication and Signal Processing (ICCSP), 1031-1035.
17. Joshua C. Klontz, Brendan F. Klare, Scott Klum, Anil K. Jain, Mark J. Burge, “Open source biometric recognition”, Biometrics: Theory Applications and Systems (BTAS) 2013 IEEE Sixth International Conference on, pp. 1–8, 2012.
18. Patil, Archana and Patil, Dr. Rekha, An Analysis Report on Green Cloud Computing Current Trends and Future Research Challenges (March 19, 2019). Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur - India, February 26-28, 2019, Available at SSRN: https://ssrn.com/abstract=3355151 or http://dx.doi.org/10.2139/ssrn.3355151
19. Sarvabhatla, M., Giri, M., Vorugunti, C.S., Cryptanalysis of cryptanalysis and improvement of Yan et al., Biometric- based authentication scheme for TMIS, CoRR, 2014.
20. Ziyad, S., & Rehman, S. Critical Review of Authentication Mechanisms in Cloud Computing, (2014).
21. Shruti Bawaskar et al, /(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2), 960-966, 2016.
2
Privacy in Multi-Tenancy Cloud Using Deep Learning
Shweta Solanki1* and Prafull Narooka2
1 MDS University Ajmer, Ajmer, India
2 Department of Computer Science, Agrawal College, Merta City, Rajasthan
* Corresponding author: [email protected]
Abstract
There is a responsibility to maintain the privacy and security of data in the Cloud Computing environment. In present times, the need for privacy is increased due to frequent development in multi-tenant service based systems. As a system of growth increases, the requirement