THREE TIER DATA STORAGE SECURITYIN CLOUD USING FACE FUZZY VAULT
نویسندگان
چکیده
منابع مشابه
Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage
Cloud storage services allow users to efficiently outsource their documents anytime and anywhere. Such convenience, however, leads to privacy concerns. While storage providers may not read users’ documents, attackers may possibly gain access by exploiting vulnerabilities in the storage system. Documents may also be leaked by curious administrators. A simple solution is for the user to encrypt a...
متن کاملTowards Data Interoperability of Cloud Infrastructures Using Cloud Storage Services
Cloud Computing is becoming more and more popular, and various cloud services have appeared to make our lives easier. Mobile devices can also benefit from Cloud services: the huge data users produce with these devices are continuously posted to online services, which may require the modification of these data. Using cloud storage services together with computation-intensive infrastructure servi...
متن کاملBiometrics Based Secret Sharing Using Fuzzy Vault
In this paper a method for the biometric based secret sharing problem using the fuzzy vault construct is described. The secret is protected using the biometric data of the sharing parties, revealing a secret when a predetermined number of the sharing parties collaborate. The distinction between biometric cryptosystems is discussed. The basic idea of the fuzzy vault scheme is discussed. Finally ...
متن کاملHardening Fingerprint Fuzzy Vault Using Password
Security of stored templates is a critical issue in biometric systems because biometric templates are non-revocable. Fuzzy vault is a cryptographic framework that enables secure template storage by binding the template with a uniformly random key. Though the fuzzy vault framework has proven security properties, it does not provide privacy-enhancing features such as revocability and protection a...
متن کاملFingerprint Template Protection Using Fuzzy Vault
Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non–invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer and Communication Technology
سال: 2012
ISSN: 2231-0371,0975-7449
DOI: 10.47893/ijcct.2012.1137