2007 716
Full Length Article
Journal of Cognitive Human-Computer Interaction
Volume 2 , Issue 2, PP: 60-64 , 2022 | Cite this article as | XML | Html |PDF

Title

Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques

  M. Sumithra 1 ,   Kiruthika.S 2 ,   Nithya S 3 ,   Poornima B 4 ,   DharanyaS 5

1  Department of Information Technology, Panimalar Engineering College, Panimalar Engineering College, India
    (Sumithram.id@gmail.com)

2  Department of Information Technology, Panimalar Engineering College, Panimalar Engineering College, India
    (kiruthikaselvam30@gmail.com)

3  Department of Information Technology, Panimalar Engineering College, Panimalar Engineering College, India
    (nithyasarvesh20@gmail.com)

4  Department of Information Technology, Panimalar Engineering College, Panimalar Engineering College, India
    (poornimabalaji012@gmail.com)

5  Department of Information Technology, Panimalar Engineering College, Panimalar Engineering College, India
    (dharanyasakthi19@gmail.com)


Doi   :   https://doi.org/10.54216/JCHCI.020204

Received: October27, 2021 Accepted:April9, 2022

Abstract :

As technology progresses, in figuring and broadcast communications, electronic images and video are

playing more important roles in today's data age. The Human Face is a key component of video and audio

databases utilized by observation frameworks. Recognizing and locating human features and face

highlights in a photograph or series of photographs is a difficult task in unusual scenarios, such as

recordings, when acoustic conditions, illumination, subject regions, and posture can vary dramatically

from edge to edge. A Human Face is an automated framework that a school uses to monitor the

engagement of its employees and students. Using the Real-Time Face Recognition utility, distinct

customer faces are identified and perceived with the information base to look after a company's

representatives and their activities. Although the cloud offers numerous advantages, it does have one clear

disadvantage: the level of protection required to access user data. The cloud poses the possibility of

unauthorized access to user data. The user data was taken from the cloud application due to a security

issue in the cloud. As a result, many people are concerned about their data. So, in this study, we'll use Face

Recognition Technology to solve the problem. Using Artificial Intelligence Face Recognition The user is

the only one who has access to the cloud. If someone else tries to access or steal data from the cloud, it

will notify the user. User data may be safeguarded and only the verified user can access the Cloud

utilizing real Face Recognition Technology.

Keywords :

Face Recognition in Real Time , Automated Framework , Artificial Intelligence , Security.

References :

[1] SusheelaHooda, Vikas Lamba, AmandeenKaur,"AI and Soft Computing Techniques for Securing Cloud and

Edge Computing: A Systematic Review", 2021 5th International Conference on Information Systems and

Computer Networks (ISCON) , 22-23 Oct. 2021.

[2] Vikas Agarwal, Nisha Gupta, Arun Kumar, " AI-Assisted Security Controls Mapping for Clouds Built for

Regulated Workloads", 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), 5-10 Sept.

2021.

[3] SiemGirmay, Faniel Samson, Asad Masood Khattak ," AI based Login System using Facial Recognition ",

2021 5th Cyber Security in Networking Conference (CSNet) , 12-14 Oct. 2021

[4] Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., &Vakali, A. (2009). Cloud computing: Dis-tributed

internet computing for IT and scientific research. IEEE Internet Computing, 13(5), 10–13.

doi:10.1109/MIC.2009.103

[5] M. Sumithra and Dr. S. Malathi, ” Modified Global Flower Pollination Algorithm-based image fusion for

medical diagnosis using computed tomography and magnetic resonance imaging”, International Journal of

Imaging Systems and Technology, Vol. 31, Issue No.1, pp. 223-235, 2021

[6] B.Buvanswari and T.Kalpalatha Reddy, “A Review of EEG Based Human Facial Expression Recognition

Systems in Cognitive Sciences” International Conference on Enenrgy, Communication,Data analytics and

SoftComputing(ICECDS),CFP17M55-PRJ:978-1-5386-1886-8”,August 2017.

[7] M. Sumithra and Dr. S. Malathi, “3D Densealex NET Model with Back Propagation for Brain Tumor

Segmentation”, International Journal OfCurent Research and Review, Vol. 13, Issue 12, 2021.

[8] K. Sridharan , and Dr. M. Chitra "SBPE: A paradigm Approach for proficient Information Retrieval , Jokull

Journal" , Vol 63, No. 7;Jul 2013

[9] M. Sumithra and Dr. S. Malathi, “Segmentation Of Different Modalitites Using Fuzzy K-Means And Wavelet

ROI”, International Journal Of Scientific & Technology Research, Vol. 8, Issue 11, pp. 996-1002, November

2019.

[10] B.Buvaneswari and Dr.T. KalpalathaReddy,“EEG signal classification using soft computing techniques for

brain disease diagnosis”,Journal of International Pharmaceutical Research ,ISSN : 1674-

0440,Vol.46,No.1,Pp.525-528,2019.

[11] M. Sumithra and S. Malathi, “ A Survey of Brain Tumor Segmentation Methods with Different Image

Modalitites”, International Journal of Computer Science Trends and Technology (IJCST) – Vol. 5 Issue 2, Mar

– Apr 2017

[12] B.BuvaneswariandDr.T.Kalpalatha Reddy, “High Performance Hybrid Cognitive Framework for Bio-Facial

Signal Fusion Processing for the Disease Diagnosis”, Measurement,ISSN: 0263-2241, Vol. 140, Pp.89-99,2019.

[13] [13] M. Sumithra and Dr. S. Malathi, “A Brief Survey on Multi Modalities Fusion”, Lecture Notes on Data

Engineering and Communications Technologies, Springer, 35, pp. 1031-1041,2020.

[14] K. Sridharan , and Dr. M. Chitra "Web Based Agent And Assertion Passive Grading For Information

Retervial", ARPN Journal of Engineering and Applied Sciences, VOL. 10, NO. 16, September 2015 pp:7043-

7048

[15] M. Sumithra and S. Malathi, “A survey on Medical Image Segmentation Methods with Different Modalitites”,

International Journal of Engineering Research and Technology (IJERT) – Vol. 6 Issue 2, Mar 2018.

[16] [16] B.Buvaneswari and Dr.T. KalpalathaReddy,“ELSA- A Novel Technique to Predict Parkinson's Disease in

Bio-Facial”,International Journal of Advanced Trends in Computer Science and Engineering, ISSN 2278-

3091,Vol.8,No.1,Pp. 12-17,2019

[17] [17] K. Sridharan , and Dr. M. Chitra , Proficient Information Retrieval Using Trust Based Search On Expert

And Knowledge Users Query Formulation System, Australian Journal of Basic and Applied Sciences, 9(23)

July 2015, Pages: 755-765.


Cite this Article as :
Style #
MLA M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS. "Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques." Journal of Cognitive Human-Computer Interaction, Vol. 2, No. 2, 2022 ,PP. 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)
APA M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS. (2022). Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques. Journal of Journal of Cognitive Human-Computer Interaction, 2 ( 2 ), 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)
Chicago M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS. "Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques." Journal of Journal of Cognitive Human-Computer Interaction, 2 no. 2 (2022): 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)
Harvard M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS. (2022). Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques. Journal of Journal of Cognitive Human-Computer Interaction, 2 ( 2 ), 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)
Vancouver M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS. Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques. Journal of Journal of Cognitive Human-Computer Interaction, (2022); 2 ( 2 ): 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)
IEEE M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS, Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques, Journal of Journal of Cognitive Human-Computer Interaction, Vol. 2 , No. 2 , (2022) : 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)