Biometric Authentication in Cloud Computing
R. Velvizhi1, P. Nandhini2, R. Elankavi3

1R.Velvizhi, Department of CSE, Bharath Institute of Higher Education and Research, Chennai, India.

2P.Nandhini Department of CSE, Bharath Institute of Higher Education and Research, Chennai, India. 

3MrR.Elankavi Department of CSE, Bharath Institute of Higher Education and Research, Chennai, India.

Manuscript received on 04 July 2019 | Revised Manuscript received on 17 July 2019 | Manuscript Published on 23 August 2019 | PP: 554-556 | Volume-8 Issue-9S3 August 2019 | Retrieval Number: I31080789S319/2019©BEIESP | DOI: 10.35940/ijitee.I3108.0789S319

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The cloud clients are confronting serious issue of phony login and information robbery. So it is extremely important to confirm the cloud client that demands access to a record for giving protection and security. Distributed computing is turning into a hot pattern in IT businesses step by step. A considerable lot of the companies are utilizing cloud for putting away and keeping up their enormous information on cloud servers. In bygone day’s passwords and pins are utilized for verifying information. Along these lines, Hackers can split these passwords and sticks and results in the uncertain information, so we need a safe system to shield the information from interlopers and programmers. For that reason, we are utilizing the idea of Biometric Authentication alongside information pressure and information encryption. The systems utilized for biometric confirmation in cloud faces execution issues like time complexities and space complexities. Symmetric Advanced Encryption Standard (AES) Algorithm is utilized for encoding the mystery esteem with biometric key.

Keywords: Hackers, Distributed computing Advanced Encryption Standard
Scope of the Article: Cloud Computing