Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone
Presently, there are several IT services that provide services for convenient access. Users can access those services by local access or remote access from anytime or anywhere including services which are on cloud computing system. Furthermore, mobile devices are very more widely used in our society...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
UIKTEN
2018-08-01
|
Series: | TEM Journal |
Subjects: | |
Online Access: | http://www.temjournal.com/content/73/TemJournalAugust2018_475_479.pdf |
id |
doaj-d45f6659d3284d45970a4012f4c0addd |
---|---|
record_format |
Article |
spelling |
doaj-d45f6659d3284d45970a4012f4c0addd2020-11-25T00:21:45ZengUIKTENTEM Journal2217-83092217-83332018-08-017347547910.18421/TEM73-01Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhoneSorapak Pukdesree0Paniti Netinant1School of Information Technology and Innovation, Bangkok University, ThailandCollege of Information and Communication Technology, Rangsit University, Pathumthani, ThailandPresently, there are several IT services that provide services for convenient access. Users can access those services by local access or remote access from anytime or anywhere including services which are on cloud computing system. Furthermore, mobile devices are very more widely used in our society as we have seen the large number of delivered mobile devices each year. However, the security for accessing the cloud services must be concerned because there are many of illicit uses of the processes easier for fraudsters. Authentication is one of the ways to prevent fraudsters. This research proposes both physical features by using face recognition and voice recognition system and behavioural feature using password. This paper describes face recognition processes in more detail. Researchers also proposed adaptive biometric authentication for accessing cloud computing services using iPhone. The research integrates the adaptive biometric authentication with multi-modal approaches which have advantages in term of flexibility and security. The status of this research is in progress.http://www.temjournal.com/content/73/TemJournalAugust2018_475_479.pdfCloud computingAdaptiveFace RecognitionBiometric Authentication |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sorapak Pukdesree Paniti Netinant |
spellingShingle |
Sorapak Pukdesree Paniti Netinant Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone TEM Journal Cloud computing Adaptive Face Recognition Biometric Authentication |
author_facet |
Sorapak Pukdesree Paniti Netinant |
author_sort |
Sorapak Pukdesree |
title |
Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone |
title_short |
Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone |
title_full |
Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone |
title_fullStr |
Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone |
title_full_unstemmed |
Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone |
title_sort |
reviewed: the face authentication processes for accessing cloud computing services using iphone |
publisher |
UIKTEN |
series |
TEM Journal |
issn |
2217-8309 2217-8333 |
publishDate |
2018-08-01 |
description |
Presently, there are several IT services that provide services for convenient access. Users can access those services by local access or remote access from anytime or anywhere including services which are on cloud computing system. Furthermore, mobile devices are very more widely used in our society as we have seen the large number of delivered mobile devices each year. However, the security for accessing the cloud services must be concerned because there are many of illicit uses of the processes easier for fraudsters. Authentication is one of the ways to prevent fraudsters. This research proposes both physical features by using face recognition and voice recognition system and behavioural feature using password. This paper describes face recognition processes in more detail. Researchers also proposed adaptive biometric authentication for accessing cloud computing services using iPhone. The research integrates the adaptive biometric authentication with multi-modal approaches which have advantages in term of flexibility and security. The status of this research is in progress. |
topic |
Cloud computing Adaptive Face Recognition Biometric Authentication |
url |
http://www.temjournal.com/content/73/TemJournalAugust2018_475_479.pdf |
work_keys_str_mv |
AT sorapakpukdesree reviewedthefaceauthenticationprocessesforaccessingcloudcomputingservicesusingiphone AT panitinetinant reviewedthefaceauthenticationprocessesforaccessingcloudcomputingservicesusingiphone |
_version_ |
1725361069827817472 |