Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone

Presently, there are several IT services that provide services for convenient access. Users can access those services by local access or remote access from anytime or anywhere including services which are on cloud computing system. Furthermore, mobile devices are very more widely used in our society...

Full description

Bibliographic Details
Main Authors: Sorapak Pukdesree, Paniti Netinant
Format: Article
Language:English
Published: UIKTEN 2018-08-01
Series:TEM Journal
Subjects:
Online Access:http://www.temjournal.com/content/73/TemJournalAugust2018_475_479.pdf
Description
Summary:Presently, there are several IT services that provide services for convenient access. Users can access those services by local access or remote access from anytime or anywhere including services which are on cloud computing system. Furthermore, mobile devices are very more widely used in our society as we have seen the large number of delivered mobile devices each year. However, the security for accessing the cloud services must be concerned because there are many of illicit uses of the processes easier for fraudsters. Authentication is one of the ways to prevent fraudsters. This research proposes both physical features by using face recognition and voice recognition system and behavioural feature using password. This paper describes face recognition processes in more detail. Researchers also proposed adaptive biometric authentication for accessing cloud computing services using iPhone. The research integrates the adaptive biometric authentication with multi-modal approaches which have advantages in term of flexibility and security. The status of this research is in progress.
ISSN:2217-8309
2217-8333