User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 42
 Downloands 6
An Extensive Study on Biometric based Secure Data Computing framework for Mobile Cloud Environments
2021
Journal:  
Turkish Online Journal of Qualitative Inquiry
Author:  
Abstract:

Mobile cloud computing is gaining popularity among mobile users as it is considered as long envisaged vision of computing as a utility. Despite of its popularity, innovative advances in hardware, networking, middleware, and virtual machine technologies have led to an exploration of new, globally distributed mobile cloud computing platforms. Mobile Cloud Computing provides computation and storage from anywhere around the world via the Internet without adopting for purchase of new infrastructure, training, or software licensing. Mobile cloud is a service model which has been used by mobile device for information storage, searching and data mining and multimedia processing. In addition, this advanced computing platform brings many new challenges for data security and access control on the user data stored on cloud servers. As the data users, no longer have physical possession of the outsourced data, makes the data integrity, privacy and authenticity protection in Cloud Computing a very challenging and potentially difficult task. In order to tackle those challenges, cryptography based secure architecture has been employed to effectively disseminate the user to access the data stored by the data owner.  However those techniques further leads to heavy computational time and cost. In this paper, an extensive study has been carried out using biometric based authentication architecture to strengthen the security of data stored in the cloud environment. It is vital and essential task for providing detailed insight on those authentication systems. The efficacy of each model has been demonstrated on single modal and multimodal fusion. Moreover importance of fusion based representatives has been exploited for secure data access paradigm. Finally outline of the proposed methodology as framework to secure data access using biometric based system has been provided. Evaluation of models has been carried out on the processing of the biometric images of the data users.

Keywords:

0
2021
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles










Turkish Online Journal of Qualitative Inquiry

Field :   Eğitim Bilimleri

Journal Type :   Uluslararası

Metrics
Article : 4.283
Cite : 1.138
2023 Impact : 0.002
Turkish Online Journal of Qualitative Inquiry