Research Paper on Data Security Through Speech Recognition In Cloud Computing
Nisha Sharma1 , Er.Amit Kishor2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-9 , Page no. 204-206, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.204206
Online published on Sep 30, 2018
Copyright © Nisha Sharma, Er.Amit Kishor . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Nisha Sharma, Er.Amit Kishor, “Research Paper on Data Security Through Speech Recognition In Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.204-206, 2018.
MLA Style Citation: Nisha Sharma, Er.Amit Kishor "Research Paper on Data Security Through Speech Recognition In Cloud Computing." International Journal of Computer Sciences and Engineering 6.9 (2018): 204-206.
APA Style Citation: Nisha Sharma, Er.Amit Kishor, (2018). Research Paper on Data Security Through Speech Recognition In Cloud Computing. International Journal of Computer Sciences and Engineering, 6(9), 204-206.
BibTex Style Citation:
@article{Sharma_2018,
author = {Nisha Sharma, Er.Amit Kishor},
title = {Research Paper on Data Security Through Speech Recognition In Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {204-206},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2845},
doi = {https://doi.org/10.26438/ijcse/v6i9.204206}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.204206}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2845
TI - Research Paper on Data Security Through Speech Recognition In Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Nisha Sharma, Er.Amit Kishor
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 204-206
IS - 9
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
671 | 362 downloads | 183 downloads |
Abstract
Affects like lower cost, boom throughput, availability however it additionally Information and telecommunication generation (ICT) has through deep into the person lives and is impacting person life fashion in one-of-a-kind components. The quick increase in ICT has commenced upgrade in computing gadget and computing expertise. Presently cloud computing is one of the extreme promoted transformation. It has various effective have positive safety problems that have to be treated delicately. There are various procedures that may be used to conquer this foremost hassle. Here this paper will research biometric authentication for data safety in cloud computing, it’s numerous techniques and the way they`re useful in decreasing the security warning. It gives an expansive and organized evaluation of biometric authentication for boosting cloud protection.
Key-Words / Index Term
Cloud Computing, Safety Issues; Information Access; Licensed User; Biometric Authentication; Cloud Resource Supplier (CRP), Validation
References
[1]. NIST, FIPS PUB 197, “Advanced Encryption Standard (AES),” November 2001[Online].
Available:http://csrc.nist.gov/publications/ fips/fips197/fips-197.pdf.
[2]. Cloud computing principles, systems and applications NICK Antonopoulos http://mgitech.wordpress.com
[3] “Cloud Security and Privacy ” , Tim Mather, Sutra Kumaraswamy, and ShahedLatif – O’Reilly Book.
[4] Manoj Diwakar and Manish Maharshi,
“An Extraction and Recognition of Tongue-Print Images for Biometrics AuthenticationSystem”,International
Journal of Computer Applications, ISSN:
0975–8887, Vol. 61, No. 3, January 2013
[5] Yashpal Kadam, “Security Issues in Cloud Computing A Transparent View”, International Journal of Computer Science Emerging Technology, Vol-2 No 5 October 2011 , 316-322.