Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone

Presently, there are several IT services that provide services for convenient access. Users can access those services by local access or remote access from anytime or anywhere including services which are on cloud computing system. Furthermore, mobile devices are very more widely used in our society...

Full description

Bibliographic Details
Main Authors: Sorapak Pukdesree, Paniti Netinant
Format: Article
Language:English
Published: UIKTEN 2018-08-01
Series:TEM Journal
Subjects:
Online Access:http://www.temjournal.com/content/73/TemJournalAugust2018_475_479.pdf
id doaj-d45f6659d3284d45970a4012f4c0addd
record_format Article
spelling doaj-d45f6659d3284d45970a4012f4c0addd2020-11-25T00:21:45ZengUIKTENTEM Journal2217-83092217-83332018-08-017347547910.18421/TEM73-01Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhoneSorapak Pukdesree0Paniti Netinant1School of Information Technology and Innovation, Bangkok University, ThailandCollege of Information and Communication Technology, Rangsit University, Pathumthani, ThailandPresently, there are several IT services that provide services for convenient access. Users can access those services by local access or remote access from anytime or anywhere including services which are on cloud computing system. Furthermore, mobile devices are very more widely used in our society as we have seen the large number of delivered mobile devices each year. However, the security for accessing the cloud services must be concerned because there are many of illicit uses of the processes easier for fraudsters. Authentication is one of the ways to prevent fraudsters. This research proposes both physical features by using face recognition and voice recognition system and behavioural feature using password. This paper describes face recognition processes in more detail. Researchers also proposed adaptive biometric authentication for accessing cloud computing services using iPhone. The research integrates the adaptive biometric authentication with multi-modal approaches which have advantages in term of flexibility and security. The status of this research is in progress.http://www.temjournal.com/content/73/TemJournalAugust2018_475_479.pdfCloud computingAdaptiveFace RecognitionBiometric Authentication
collection DOAJ
language English
format Article
sources DOAJ
author Sorapak Pukdesree
Paniti Netinant
spellingShingle Sorapak Pukdesree
Paniti Netinant
Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone
TEM Journal
Cloud computing
Adaptive
Face Recognition
Biometric Authentication
author_facet Sorapak Pukdesree
Paniti Netinant
author_sort Sorapak Pukdesree
title Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone
title_short Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone
title_full Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone
title_fullStr Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone
title_full_unstemmed Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone
title_sort reviewed: the face authentication processes for accessing cloud computing services using iphone
publisher UIKTEN
series TEM Journal
issn 2217-8309
2217-8333
publishDate 2018-08-01
description Presently, there are several IT services that provide services for convenient access. Users can access those services by local access or remote access from anytime or anywhere including services which are on cloud computing system. Furthermore, mobile devices are very more widely used in our society as we have seen the large number of delivered mobile devices each year. However, the security for accessing the cloud services must be concerned because there are many of illicit uses of the processes easier for fraudsters. Authentication is one of the ways to prevent fraudsters. This research proposes both physical features by using face recognition and voice recognition system and behavioural feature using password. This paper describes face recognition processes in more detail. Researchers also proposed adaptive biometric authentication for accessing cloud computing services using iPhone. The research integrates the adaptive biometric authentication with multi-modal approaches which have advantages in term of flexibility and security. The status of this research is in progress.
topic Cloud computing
Adaptive
Face Recognition
Biometric Authentication
url http://www.temjournal.com/content/73/TemJournalAugust2018_475_479.pdf
work_keys_str_mv AT sorapakpukdesree reviewedthefaceauthenticationprocessesforaccessingcloudcomputingservicesusingiphone
AT panitinetinant reviewedthefaceauthenticationprocessesforaccessingcloudcomputingservicesusingiphone
_version_ 1725361069827817472