Anusha Bodepudi, M. Reddy, Sai Srujan Gutlapalli, Mounika Mandapuram
{"title":"云计算中间接指纹认证的算法策略","authors":"Anusha Bodepudi, M. Reddy, Sai Srujan Gutlapalli, Mounika Mandapuram","doi":"10.18034/ajtp.v8i3.651","DOIUrl":null,"url":null,"abstract":"User identity identification secures cloud computing. This study examined cloud service security authentication needs. Fingerprint recognition was used to create a new cloud security authentication system. The proposed system's design and process were thoroughly examined to secure cloud user data from unauthorized access. This study proposes a secure cloud server fingerprint match technique. Considering fingerprint uniqueness and stability, cloud security login authentication technology employing fingerprint recognition is researched to improve cloud services login security. Analyze the cloud security login system structure first. Next, fingerprint identification is explained. Finally, fingerprint identification of cloud security login systems is investigated from fingerprint registration, certification, fingerprint image processing perspectives, and a simple fingerprint image processing simulation. The results show that this login mechanism is secure and versatile. The biometric template is insecure, and stolen templates cannot be canceled, making user identity leaks easy. This work proposes indirect fingerprint authentication to address these issues. Finally, a thorough security analysis of the cloud computing method is offered.","PeriodicalId":433827,"journal":{"name":"American Journal of Trade and Policy","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing\",\"authors\":\"Anusha Bodepudi, M. Reddy, Sai Srujan Gutlapalli, Mounika Mandapuram\",\"doi\":\"10.18034/ajtp.v8i3.651\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"User identity identification secures cloud computing. This study examined cloud service security authentication needs. Fingerprint recognition was used to create a new cloud security authentication system. The proposed system's design and process were thoroughly examined to secure cloud user data from unauthorized access. This study proposes a secure cloud server fingerprint match technique. Considering fingerprint uniqueness and stability, cloud security login authentication technology employing fingerprint recognition is researched to improve cloud services login security. Analyze the cloud security login system structure first. Next, fingerprint identification is explained. Finally, fingerprint identification of cloud security login systems is investigated from fingerprint registration, certification, fingerprint image processing perspectives, and a simple fingerprint image processing simulation. The results show that this login mechanism is secure and versatile. The biometric template is insecure, and stolen templates cannot be canceled, making user identity leaks easy. This work proposes indirect fingerprint authentication to address these issues. Finally, a thorough security analysis of the cloud computing method is offered.\",\"PeriodicalId\":433827,\"journal\":{\"name\":\"American Journal of Trade and Policy\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"American Journal of Trade and Policy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18034/ajtp.v8i3.651\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"American Journal of Trade and Policy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18034/ajtp.v8i3.651","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing
User identity identification secures cloud computing. This study examined cloud service security authentication needs. Fingerprint recognition was used to create a new cloud security authentication system. The proposed system's design and process were thoroughly examined to secure cloud user data from unauthorized access. This study proposes a secure cloud server fingerprint match technique. Considering fingerprint uniqueness and stability, cloud security login authentication technology employing fingerprint recognition is researched to improve cloud services login security. Analyze the cloud security login system structure first. Next, fingerprint identification is explained. Finally, fingerprint identification of cloud security login systems is investigated from fingerprint registration, certification, fingerprint image processing perspectives, and a simple fingerprint image processing simulation. The results show that this login mechanism is secure and versatile. The biometric template is insecure, and stolen templates cannot be canceled, making user identity leaks easy. This work proposes indirect fingerprint authentication to address these issues. Finally, a thorough security analysis of the cloud computing method is offered.