Loading

Secured data management using face detection and Video mode
B. Kalpana1, A.K.Manaswini2, K. Gayathri3, Kotamreddy Srilekha4

1Dr.B.Kalapana, Assistant Professor, Department of Information Technology, R.M.D Engineering College, Thiruvallur, Tamil Nadu, India.
2A.K.Manaswini*, Currently pursuing bachelor’s degree in the stream Information Technology at R.M.D Engineering College, Thiruvallur, Tamil Nadu, India.
3K.Gayathri, Currently pursuing bachelor’s degree in the stream Information Technology at R.M.D Engineering College, Thiruvallur, Tamil Nadu, India.
4Kotamreddy Srilekha, Currently pursuing bachelor’s degree in the stream Information Technology at R.M.D Engineering College, Thiruvallur, Tamil Nadu, India.
Manuscript received on April 20, 2020. | Revised Manuscript received on April 30, 2020. | Manuscript published on May 10, 2020. | PP: 1222-1224 | Volume-9 Issue-7, May 2020. | Retrieval Number: G5805059720/2020©BEIESP | DOI: 10.35940/ijitee.G5805.059720
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Data security is protecting digital data, from the unwanted actions of unauthorized users, like cyberattack or data breach. Data is no longer said to be secure if it falls into the hands of hackers or those that would misuse it. Data is well secured and guarded within an organization. But, when its employees sell their access specifiers to their competitors, data is no longer protected. This could be avoided by advanced technology. The Identity-based approach is an approach to regulate access to a digital product or service based on the identity of an individual. This allows organizations to grant access to a variety of digital services using the same credentials, ensuring the accurate match between what users are entitled to and what they really receive, while also permitting other access constraints like company, device, location and application type(attributes) In our application, data is uploaded by an encryption format attached with the video mode and it is downloadable by the user only through the unique face detection mode. When a user tries to download the encrypted file, a notification is sent to four admins for better privacy reasons. Only upon acceptance from four of these admins, the file could be downloaded. The admins can authenticate the user using his face captured through face detection. This could be used at any level in an organization but is much efficient when no of users trying to access a file is limited. This provides high security and rejects unauthorized users. Breach of data leads to a decline in profits and incline in losses. This could be reduced if the data security could be ensured using face detection of a person who is trying to access the data. 
Keywords: Identity-based approach, Encryption, Face detection.
Scope of the Article: Data Management