B. Chang, H. Tsai, Chi-Ming Chen, Chien-Feng Huang
{"title":"基于快速人脸和指纹识别的云计算访问控制","authors":"B. Chang, H. Tsai, Chi-Ming Chen, Chien-Feng Huang","doi":"10.1109/IBICA.2011.49","DOIUrl":null,"url":null,"abstract":"In this paper,a fast access control applied to Hadoop cloud computing using the fingerprint identiication and face recognition is introduced.This study employed a way of low-capacity Linux embedded platform linked to Hadoop via Ethernet,WiFi or 3G.At client side,JamVM virtual machine is utilized to from the J2ME environment,and GNU Classpath is viewed as Java Class Libraries.In order to verify effectiveness and efficiency in access control for cloud computing,the rapid face and fingerprint identification has been accomplished successfully within 2.2 seconds to exactly perform the subject identity under the cross-examination.The experimental results show that the one we proposed outperforms two alternative methods.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Access Control of Cloud Computing Using Rapid Face and Fingerprint Identification\",\"authors\":\"B. Chang, H. Tsai, Chi-Ming Chen, Chien-Feng Huang\",\"doi\":\"10.1109/IBICA.2011.49\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper,a fast access control applied to Hadoop cloud computing using the fingerprint identiication and face recognition is introduced.This study employed a way of low-capacity Linux embedded platform linked to Hadoop via Ethernet,WiFi or 3G.At client side,JamVM virtual machine is utilized to from the J2ME environment,and GNU Classpath is viewed as Java Class Libraries.In order to verify effectiveness and efficiency in access control for cloud computing,the rapid face and fingerprint identification has been accomplished successfully within 2.2 seconds to exactly perform the subject identity under the cross-examination.The experimental results show that the one we proposed outperforms two alternative methods.\",\"PeriodicalId\":158080,\"journal\":{\"name\":\"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IBICA.2011.49\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IBICA.2011.49","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Access Control of Cloud Computing Using Rapid Face and Fingerprint Identification
In this paper,a fast access control applied to Hadoop cloud computing using the fingerprint identiication and face recognition is introduced.This study employed a way of low-capacity Linux embedded platform linked to Hadoop via Ethernet,WiFi or 3G.At client side,JamVM virtual machine is utilized to from the J2ME environment,and GNU Classpath is viewed as Java Class Libraries.In order to verify effectiveness and efficiency in access control for cloud computing,the rapid face and fingerprint identification has been accomplished successfully within 2.2 seconds to exactly perform the subject identity under the cross-examination.The experimental results show that the one we proposed outperforms two alternative methods.