2020
DOI: 10.1080/1206212x.2020.1809177
|View full text |Cite
|
Sign up to set email alerts
|

Improving cloud data security through hybrid verification technique based on biometrics and encryption system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…➢ The static authentication provided for the long term in conventional works was vulnerable to password-guessing attacks by the attacker (Shyla & Sujatha, 2022). ➢ In existing works, the data was secured with a One Time Password (OTP) based cryptography model, which can be retrieved by attackers through shoulder surfing attacks (Hossain & Al Hasan, 2022). ➢ The user data was authenticated in existing work using the hashing technique grounded on the known parameters of the network.…”
Section: Problem Statementmentioning
confidence: 99%
“…➢ The static authentication provided for the long term in conventional works was vulnerable to password-guessing attacks by the attacker (Shyla & Sujatha, 2022). ➢ In existing works, the data was secured with a One Time Password (OTP) based cryptography model, which can be retrieved by attackers through shoulder surfing attacks (Hossain & Al Hasan, 2022). ➢ The user data was authenticated in existing work using the hashing technique grounded on the known parameters of the network.…”
Section: Problem Statementmentioning
confidence: 99%
“…Hossain et al 29 suggested hybrid verification technique for improving the security of data against the unauthorized users. Here, the biometric verification application has been considered for testing the effectiveness of this security framework.…”
Section: Related Workmentioning
confidence: 99%
“…From this analysis, it is studied that the access controlling models used for cloud data security must require to satisfy the properties of flexibility, dynamicity, compatibility, descriptive ability, and privilege. Hossain et al 29 suggested hybrid verification technique for improving the security of data against the unauthorized users. Here, the biometric verification application has been considered for testing the effectiveness of this security framework.…”
Section: Related Workmentioning
confidence: 99%
“…But, data security is a crucial issue, because of the severe susceptibility and hitch in cloud storage [9,10]. In conventional approaches, encrypting data before transmitting and saving it as ciphertext in the cloud is an extensively applied approach for performing data privacy protection [11,12,13]. Conventional cryptographic cloud storage needs the management of a huge amount of keys.…”
Section: Introductionmentioning
confidence: 99%