Loading

A Secure and Efficient Fog Computing Storage Using Bio-Metric
B. Tirapathi Reddy1, Ch. Hari Ayyanna Chowdary2, Ch. V. TirupathiRaidu3, G. Krishna Vamsi4

1Dr. B. Tirapathi Reddy, Associate Professor, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P), India.
2Ch. Hari Ayyanna Chowdary, UG Students, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P), India.
3Ch. V. TirupathiRaidu, UG Students, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P), India.
4G.Krishna Vamsi, UG Students, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P), India.
Manuscript received on 07 March 2019 | Revised Manuscript received on 20 March 2019 | Manuscript published on 30 March 2019 | PP: 64-69 | Volume-8 Issue-5, March 2019 | Retrieval Number: D2860028419/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the present society, propels in invention have made life less demanding by giving us more hoisted measures of information through development of numerousdevices. In any situation, each mechanical development harbors capability of shrouded risks to its customers. One notabledanger is burglary of private specificdata &information. As advanced data turned out to be more predominant, customers endeavor to anchor their data with ID cards &encoded passwords. Nonetheless, the abuse and burglary of these safety efforts are likewise on the ascent. Exploiting security imperfections in ID cards result in cards being copied or forged and being abused. This increasing fight with digital safety has prompted introduction of biometric security systems. Laying out standard contrasts among strategies for biometric invention utilized to confirm client characters will reveal insight into the preferences and drawbacks of individual information security frameworks.
Keyword: Multimodal Biometric Authentication, Security of Information Dwelling, Data Fragmentation.
Scope of the Article: Internet Computing