Biometric Mobile Data on Secure Public Cloud Vulnerabilities
Venkata Venugopal Rao Gudlur @ Saigopal1, Sundresan Perumal2

1Venkata Venugopal Rao Gudlur @ Saigopal, Ph.D Aspirant, Limkokwing University of Creative Technology, Malaysia.
2Dr. Sundresan Perumal, Faculty of Science & Technology FST, Universiti Sains Islam Malaysia USIM.
Manuscript received on 27 June 2019 | Revised Manuscript received on 15 July 2019 | Manuscript Published on 26 July 2019 | PP: 344-347 | Volume-8 Issue-2S2 July 2019 | Retrieval Number: B10590782S219/2019©BEIESP | DOI: 10.35940/ijrte.B1059.0782S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Companies who are implementing the cloud solutions have increased numerous advantages in the recent years. Cloud solutions provide a very few preferences, for example, portability, adaptability and costs funds. Alongside the numerous advantages that distributed computing offers the security challenges that it presents are similarly striking. The two essential capacities for secure cloud administration are character administration and access control in distributed computing, the current methodologies for client confirmation depend on accreditation that are put together by the client. These accreditations incorporate passwords, tokens and computerized authentications. Most of the cases unapproved access by outsiders, for example, programmers likewise exist and simple for information control and abuse. In any case, the most serious issue with this methodology is that the presence of such many secret phrase account pairings for each individual client prompts either overlooked passwords or utilizing a similar mix for different locales. Security issue is significant concern, region of research in versatile distributed computing and clients. Shielding the remote information and applications from any ill-conceived get to remain an essential security worry in portable distributed computing. This paper explains about secure bio metric and face recognized based authentication protocol which is best suited for the public cloud environment to improve the safer and secure user authentication process. The above strategy will anchor approved clients as well as keep the cloud suppliers can’t get in to the information and data access.
Keywords: Cloud Computing, Forensic Bio Matric, Internet of Things (IoT), Mobile Data.
Scope of the Article: Cloud Computing and Networking