2021
DOI: 10.7717/peerj-cs.569
|View full text |Cite
|
Sign up to set email alerts
|

Secure biometric authentication with de-duplication on distributed cloud storage

Abstract: Cloud computing is one of the evolving fields of technology, which allows storage, access of data, programs, and their execution over the internet with offering a variety of information related services. With cloud information services, it is essential for information to be saved securely and to be distributed safely across numerous users. Cloud information storage has suffered from issues related to information integrity, data security, and information access by unauthenticated users. The distribution and sto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(11 citation statements)
references
References 47 publications
0
11
0
Order By: Relevance
“…This wastage contains soluble and insoluble content and chemicals. In this proposed work, we implement the hybrid of Voting-Based Extreme Learning Machine with sine-cosine algorithm (VELM-SCA) to improve the efficiency in the prediction of wastewater treatment plants [20][21][22][23][24][25][26][27][28][29]. The architecture of the proposed work (VELM-SCA) is given in Figure 1.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…This wastage contains soluble and insoluble content and chemicals. In this proposed work, we implement the hybrid of Voting-Based Extreme Learning Machine with sine-cosine algorithm (VELM-SCA) to improve the efficiency in the prediction of wastewater treatment plants [20][21][22][23][24][25][26][27][28][29]. The architecture of the proposed work (VELM-SCA) is given in Figure 1.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Since a data owner (DO) cannot entirely rely on the CSP, it makes sense to download all of the DO's data from the cloud storage and check the data integrity. Unfortunately, it greatly diminishes the advantages of cloud services and wastes a lot of network transmission and local storage resources 18 . Therefore, this strategy is unworkable, especially when a significant volume of data is being saved in the cloud.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, it greatly diminishes the advantages of cloud services and wastes a lot of network transmission and local storage resources. 18 Therefore, this strategy is unworkable, especially when a significant volume of data is being saved in the cloud. Moreover, from the standpoint of DOs, the CSP cannot be trusted entirely because, even if the integrity verification of the data failed, a dishonest CSP could hide the occurrence to protect its reputation.…”
mentioning
confidence: 99%
“…19 Cloud computing is the next big thing in computing, and it will be the future that everyone can envision. 20 In a private cloud, anonymity is the most important factor in data security. If nothing else, fewer individuals are aware of your private cloud gives you a greater sense of security.…”
Section: Introduction Of the Private Cloud Platformmentioning
confidence: 99%
“…The security risks in this cloud are kept to a minimum compared with the wider public cloud 19 . Cloud computing is the next big thing in computing, and it will be the future that everyone can envision 20 . In a private cloud, anonymity is the most important factor in data security.…”
Section: Introduction Of the Private Cloud Platformmentioning
confidence: 99%