Journal of Cognitive Human-Computer Interaction

Journal DOI

https://doi.org/10.54216/JCHCI

Submit Your Paper

2771-1463ISSN (Online) 2771-1471ISSN (Print)
Full Length Article

Journal of Cognitive Human-Computer Interaction

Volume 2, Issue 2, PP: 60-64, 2022 | Cite this article as | XML | | Html PDF

Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques

M. Sumithra   1 , Kiruthika.S   2 , Nithya S   3 , Poornima B   4 , DharanyaS   5

  • 1 Department of Information Technology, Panimalar Engineering College, Panimalar Engineering College, India - (Sumithram.id@gmail.com)
  • 2 Department of Information Technology, Panimalar Engineering College, Panimalar Engineering College, India - (kiruthikaselvam30@gmail.com)
  • 3 Department of Information Technology, Panimalar Engineering College, Panimalar Engineering College, India - (nithyasarvesh20@gmail.com)
  • 4 Department of Information Technology, Panimalar Engineering College, Panimalar Engineering College, India - (poornimabalaji012@gmail.com)
  • 5 Department of Information Technology, Panimalar Engineering College, Panimalar Engineering College, India - (dharanyasakthi19@gmail.com)
  • Doi: https://doi.org/10.54216/JCHCI.020204

    Received: October27, 2021 Accepted:April9, 2022
    Abstract

    As technology progresses, in figuring and broadcast communications, electronic images and video are

    playing more important roles in today's data age. The Human Face is a key component of video and audio

    databases utilized by observation frameworks. Recognizing and locating human features and face

    highlights in a photograph or series of photographs is a difficult task in unusual scenarios, such as

    recordings, when acoustic conditions, illumination, subject regions, and posture can vary dramatically

    from edge to edge. A Human Face is an automated framework that a school uses to monitor the

    engagement of its employees and students. Using the Real-Time Face Recognition utility, distinct

    customer faces are identified and perceived with the information base to look after a company's

    representatives and their activities. Although the cloud offers numerous advantages, it does have one clear

    disadvantage: the level of protection required to access user data. The cloud poses the possibility of

    unauthorized access to user data. The user data was taken from the cloud application due to a security

    issue in the cloud. As a result, many people are concerned about their data. So, in this study, we'll use Face

    Recognition Technology to solve the problem. Using Artificial Intelligence Face Recognition The user is

    the only one who has access to the cloud. If someone else tries to access or steal data from the cloud, it

    will notify the user. User data may be safeguarded and only the verified user can access the Cloud

    utilizing real Face Recognition Technology.

    Keywords :

    Face Recognition in Real Time, Automated Framework, Artificial Intelligence, Security.

    References

    [1] SusheelaHooda, Vikas Lamba, AmandeenKaur,"AI and Soft Computing Techniques for Securing Cloud and

    Edge Computing: A Systematic Review", 2021 5th International Conference on Information Systems and

    Computer Networks (ISCON) , 22-23 Oct. 2021.

    [2] Vikas Agarwal, Nisha Gupta, Arun Kumar, " AI-Assisted Security Controls Mapping for Clouds Built for

    Regulated Workloads", 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), 5-10 Sept.

    2021.

    [3] SiemGirmay, Faniel Samson, Asad Masood Khattak ," AI based Login System using Facial Recognition ",

    2021 5th Cyber Security in Networking Conference (CSNet) , 12-14 Oct. 2021

    [4] Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., &Vakali, A. (2009). Cloud computing: Dis-tributed

    internet computing for IT and scientific research. IEEE Internet Computing, 13(5), 10–13.

    doi:10.1109/MIC.2009.103

    [5] M. Sumithra and Dr. S. Malathi, ” Modified Global Flower Pollination Algorithm-based image fusion for

    medical diagnosis using computed tomography and magnetic resonance imaging”, International Journal of

    Imaging Systems and Technology, Vol. 31, Issue No.1, pp. 223-235, 2021

    [6] B.Buvanswari and T.Kalpalatha Reddy, “A Review of EEG Based Human Facial Expression Recognition

    Systems in Cognitive Sciences” International Conference on Enenrgy, Communication,Data analytics and

    SoftComputing(ICECDS),CFP17M55-PRJ:978-1-5386-1886-8”,August 2017.

    [7] M. Sumithra and Dr. S. Malathi, “3D Densealex NET Model with Back Propagation for Brain Tumor

    Segmentation”, International Journal OfCurent Research and Review, Vol. 13, Issue 12, 2021.

    [8] K. Sridharan , and Dr. M. Chitra "SBPE: A paradigm Approach for proficient Information Retrieval , Jokull

    Journal" , Vol 63, No. 7;Jul 2013

    [9] M. Sumithra and Dr. S. Malathi, “Segmentation Of Different Modalitites Using Fuzzy K-Means And Wavelet

    ROI”, International Journal Of Scientific & Technology Research, Vol. 8, Issue 11, pp. 996-1002, November

    2019.

    [10] B.Buvaneswari and Dr.T. KalpalathaReddy,“EEG signal classification using soft computing techniques for

    brain disease diagnosis”,Journal of International Pharmaceutical Research ,ISSN : 1674-

    0440,Vol.46,No.1,Pp.525-528,2019.

    [11] M. Sumithra and S. Malathi, “ A Survey of Brain Tumor Segmentation Methods with Different Image

    Modalitites”, International Journal of Computer Science Trends and Technology (IJCST) – Vol. 5 Issue 2, Mar

    – Apr 2017

    [12] B.BuvaneswariandDr.T.Kalpalatha Reddy, “High Performance Hybrid Cognitive Framework for Bio-Facial

    Signal Fusion Processing for the Disease Diagnosis”, Measurement,ISSN: 0263-2241, Vol. 140, Pp.89-99,2019.

    [13] [13] M. Sumithra and Dr. S. Malathi, “A Brief Survey on Multi Modalities Fusion”, Lecture Notes on Data

    Engineering and Communications Technologies, Springer, 35, pp. 1031-1041,2020.

    [14] K. Sridharan , and Dr. M. Chitra "Web Based Agent And Assertion Passive Grading For Information

    Retervial", ARPN Journal of Engineering and Applied Sciences, VOL. 10, NO. 16, September 2015 pp:7043-

    7048

    [15] M. Sumithra and S. Malathi, “A survey on Medical Image Segmentation Methods with Different Modalitites”,

    International Journal of Engineering Research and Technology (IJERT) – Vol. 6 Issue 2, Mar 2018.

    [16] [16] B.Buvaneswari and Dr.T. KalpalathaReddy,“ELSA- A Novel Technique to Predict Parkinson's Disease in

    Bio-Facial”,International Journal of Advanced Trends in Computer Science and Engineering, ISSN 2278-

    3091,Vol.8,No.1,Pp. 12-17,2019

    [17] [17] K. Sridharan , and Dr. M. Chitra , Proficient Information Retrieval Using Trust Based Search On Expert

    And Knowledge Users Query Formulation System, Australian Journal of Basic and Applied Sciences, 9(23)

    July 2015, Pages: 755-765.

    Cite This Article As :
    M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS. "Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques." Full Length Article, Vol. 2, No. 2, 2022 ,PP. 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)
    M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS. (2022). Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques. Journal of , 2 ( 2 ), 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)
    M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS. "Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques." Journal of , 2 no. 2 (2022): 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)
    M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS. (2022). Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques. Journal of , 2 ( 2 ), 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)
    M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS. Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques. Journal of , (2022); 2 ( 2 ): 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)
    M. Sumithra, Kiruthika.S, Nithya S, Poornima B, DharanyaS, Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques, Journal of , Vol. 2 , No. 2 , (2022) : 60-64 (Doi   :  https://doi.org/10.54216/JCHCI.020204)