Home
Author Guide
Editor Guide
Reviewer Guide
Published Issues
Special Issue
Introduction
Special Issues List
Sections and Topics
Sections
Topics
Internet of Things (IoT) in Smart Systems and Applications
Human-Computer Interaction (HCI) in Modern Technological Systems
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access
Copyright and Licensing
Preservation and Repository Policy
Publication Ethics
Editorial Process
Contact Us
General Information
ISSN:
1798-2340 (Online)
Frequency:
Monthly
DOI:
10.12720/jait
Indexing:
ESCI (Web of Science)
,
Scopus
,
CNKI
, EBSCO,
etc
.
Acceptance Rate:
17%
APC:
1000 USD
Average Days to Accept:
106 days
Managing Editor:
Ms. Mia Hu
E-mail:
editor@jait.us
Journal Metrics:
Impact Factor 2023: 0.9
4.2
2023
CiteScore
57th percentile
Powered by
Editor-in-Chief
Prof. Kin C. Yow
University of Regina, Saskatchewan, Canada
I'm delighted to serve as the Editor-in-Chief of
Journal of Advances in Information Technology
.
JAIT
is intended to reflect new directions of research and report latest advances in information technology. I will do my best to increase the prestige of the journal.
What's New
2025-04-02
Included in Chinese Academy of Sciences (CAS) Journal Ranking 2025: Q4 in Computer Science
2025-03-20
JAIT Vol. 16, No. 3 has been published online!
2025-02-27
JAIT has launched a new Topic: "Human-Computer Interaction (HCI) in Modern Technological Systems."
Home
>
Published Issues
>
2022
>
Volume 13, No. 6, December 2022
>
JAIT 2022 Vol.13(6): 638-644
doi: 10.12720/jait.13.6.638-644
A Noval Method for Cloud Security and Privacy Using Homomorphic Encryption Based on Facial Key Templates
Tadi Chandrasekhar
1
and Sumanth Kumar
2
1. ECE Department, ISTS Women’s Engineering College, Rajahmundry, India
2. ECE Department, GITAM University, Visakhapatnam, India
Abstract
—In the technology era, data is the key aspect, and securing the data is also an important task as many of the utilizers' presence online is on an incremental trend. There is a sustainable requirement to indulge the security procedures to secure the vulnerable data within cloud computing. In this regard, facial recognition is the latest technological trend in the field of biometrics and it is regarded as a fast processing technique that is available in computing devices as well as on mobile devices. The cloud computing services that include Microsoft, Google, and Amazon are utilizing different types of encryption techniques to include the aspect of privacy. The present method deploys a methodology that furnishes facial authentication and the generation of facial keys for the protection of data. The cloud mechanism is processed by facial features for authorization and authentication. The facial templates database is furnished for cloud encryption of each file that is integrated into the core algorithm of the method and the facial key is compared with the templates of the face data and later it is encrypted. The observed outcome of the study furnished a methodology that can guarantee that the information of the cloud user and the reclusive identification of the person is secured. In this study, the creation of a double abstraction methodology is performed to assure data protection on a cloud computing platform by utilizing facial templates as an important aspect of the process of encryption. The outcomes of the study show superior aspects to the state-of-art techniques.
Index Terms
—facial recognition, bio-metrics, securing, cloud mechanism, facial template, key features & CNN
Cite: Tadi Chandrasekhar and Sumanth Kumar, "A Noval Method for Cloud Security and Privacy Using Homomorphic Encryption Based on Facial Key Templates," Journal of Advances in Information Technology, Vol. 13, No. 6, pp. 638-644, December 2022.
Copyright © 2022 by the authors. This is an open access article distributed under the Creative Commons Attribution License (
CC BY-NC-ND 4.0
), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.
附件说明
PREVIOUS PAPER
The Design and Implementation of a Dashboard Web-Based Service Management Operations
NEXT PAPER
Effective Crude Oil Trading Techniques Using Long Short-Term Memory and Convolution Neural Networks
Article Metrics in Dimensions