Sunteți pe pagina 1din 6

Functional Control of Users by Biometric Behavior Features in

Cloud Computing
ABSTRACT
In long distance communication like to cloud computing based on
distributed architecture, communication between computers becomes possible
through internet common protocol. Main challenges in long distance network are
security issues, privacy and confidentiality, and control users with a reliable
method. So these security methods should be no counterfeiting and impervious.
For this purpose, using behavior biometric method to identify users and control
their function has been proposed in this article. Proposed method is based on
recognizing users behavioral characteristics and learning their functionality over
time which stored users behavior is being compared with their current behaviors
in. functionality of this method has been e!plained through presenting flowchart
and described by studying the scenario of its approach. "he essential advantage of
this method is to be mentioned as no need for any additional hardware, low cost,
and easy acceptance from users.
System Analysis
Existing System
Information "echnology #I"$ is considered to be an opportunity and an
advantage, but if its security is not being mentioned as much as its development
then this opportunity may change into a thread. Most of organizations try to keep
security of their systems by traditional approaches such as installing anti viruses,
firewalls, and etc. unaware of the fact that the data cannot be kept away from
unauthorized access, the system will have high damages. %f course it should be
noted that only a particular type of security or a special kind of product cannot be
relied on to protect organizations information. "o e!pect a product to provide all
security re&uirements of a system and network e&uipment is no more than a dream.
'omparing to all security methods, biometric is the most secure and readily
available factor in the world of information and communication. (iometric
technology is non)counterfeiting considering ease of use and uni&ueness.
(iometric characteristics are an appropriate response for strengthen security
against unauthorized access.
Proposed System
"he proposed method user behaviors have been registered in system every
moment in reference pattern system so that *ccess a resource and the number of
authenticated access of user to each resource are getting stored. "hen information
can be integrated and repeated ones can be removed in the end of the day. "he
proposed biometric system is a pattern comparison system recognizing and
controlling individuals behavior using their behavior biometric information. First
step in using this system is registering ones behavioral biometric information in
the information bank of the system. "his operation has been implemented under
the impact of time and ones functionality with the system. It means, the system
gets to know their behavioral so this knowledge increases through the time.
Functional Control of Users by Biometric Behavior Features in
Cloud Computing
System Architecture
Minimum Hardware Requirements & Software Requirements
Hardware Requirements
S+S",M - Pentium .ual)'ore 'P/ ,0122 3.42567
6*8. .IS9 - 12 5(
F:%PP+ .8I;, - <.11 M(
M%=I"%8 - <0 ;5* colour
M%/S, - :ogitech.
8*M - 3 5(
9,+(%*8. - <<2 keys enhanced.
Software Requirements
%perating system - >indows ?P
'oding :anguage - @ava
Front ,nd - @ava Server Page
Front ,nd "ool - =et beans 4.2 I.,
6osting Server - *pache ServerA5lassfish Server
(ack ,nd .atabase - mys&l
.atabase 5/I - S&lyog.
REERE!CE"
B<C 9. @., 'onnolly, D:aw of Internet Security and Privacy,D *spen Publishers,
IS(=E4F)2)4G00)134G)2, 322G.
B3C S. 'onvery,D=etwork Security *rchitectures, H'isco Press, 3221.
BGC @. *., 6ong and S. Pankanti, D(iometric Identification, H'ommunications of
the *'M, 1G#3$, p. E<)EF. .%I <2.<<10AG3F3GI.G3F<<2, 3222.

S-ar putea să vă placă și