This paper is published in Volume-5, Issue-1, 2019
Area
Cloud Computing
Author
Nadar Steffy Felicia Inbamani, Kumar P.
Org/Univ
Rajalakshmi Engineering College, Chennai, Tamil Nadu, India
Keywords
Advanced Encryption Standard (AES), Data Encryption Standard (DES), Cloud hierarchy
Citations
IEEE
Nadar Steffy Felicia Inbamani, Kumar P.. Securing cloud storage through face recognition mode, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Nadar Steffy Felicia Inbamani, Kumar P. (2019). Securing cloud storage through face recognition mode. International Journal of Advance Research, Ideas and Innovations in Technology, 5(1) www.IJARIIT.com.
MLA
Nadar Steffy Felicia Inbamani, Kumar P.. "Securing cloud storage through face recognition mode." International Journal of Advance Research, Ideas and Innovations in Technology 5.1 (2019). www.IJARIIT.com.
Nadar Steffy Felicia Inbamani, Kumar P.. Securing cloud storage through face recognition mode, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Nadar Steffy Felicia Inbamani, Kumar P. (2019). Securing cloud storage through face recognition mode. International Journal of Advance Research, Ideas and Innovations in Technology, 5(1) www.IJARIIT.com.
MLA
Nadar Steffy Felicia Inbamani, Kumar P.. "Securing cloud storage through face recognition mode." International Journal of Advance Research, Ideas and Innovations in Technology 5.1 (2019). www.IJARIIT.com.
Abstract
In many cases benefits given by a cloud server isn’t completely trusted by clients. Presently data are corrupted by an unauthenticated user with the help of employee’s. Generally, data are securely handled by Separate Organization but some employees sell their access specifiers to hackers for money due to single level Management and data are not made safe. To overcome this issue we move towards Advance Safe technology where data are downloaded by the user (admin or organization) with the help of face detection video mode when they accept the user request by recognizing their face among the hierarchy of employees and then the data is shared from one place to another. Here Encryption Algorithm is used for sharing data in a secure means by detecting a face in hierarchy.