Author:
Reddy Manjunath,Chisty Nur Mohammad Ali,Bodepudi Anusha
Abstract
Cloud computing uses few resources to give customers complete distant services via the internet. Data privacy, security, and reliability are major issues with cloud computing. Security is the biggest issue. This study discusses the biometrics framework and safe cloud computing identity management method. This paper discusses cloud computing security challenges and reviews cloud access framework approaches. It describes a novel fingerprint access-based authentication system to protect cloud services from DOS and DDoS attacks. This biometrics-based system can secure cloud services from illegal access. This study addresses cloud security and privacy via biometric face recognition. Cloud users' security and privacy are protected via biometrics recognition. This article discusses CPS and its applications, technologies, and standards. SIGNIFICANT DIFFICULTIES AND CHALLENGES ARE FOUND IN reviewing CPS security weaknesses, threats, and attacks. Presenting and analyzing current security measures and their key drawbacks. Finally, this extensive examination yields various recommendations.
Reference17 articles.
1. Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2019). Voice Recognition Systems in the Cloud Networks: Has It Reached Its Full Potential? Asian Journal of Applied Science and Engineering, 8(1), 51–60. https://doi.org/10.18034/ajase.v8i1.12
2. Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2021). Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing. American Journal of Trade and Policy, 8(3), 231–238. https://doi.org/10.18034/ajtp.v8i3.651
3. Gunzel, J. A. (2017). TACKLING THE CYBER THREAT: THE IMPACT OF THE DOD'S "NETWORK PENETRATION REPORTING AND CONTRACTING FOR CLOUD SERVICES" RULE ON DOD CONTRACTOR CYBERSECURITY, Public Contract Law Journal, 46(3), 687-712.
4. Gutlapalli, S. S. (2017). The Role of Deep Learning in the Fourth Industrial Revolution: A Digital Transformation Approach. Asian Accounting and Auditing Advancement, 8(1), 52–56. Retrieved from https://4ajournal.com/article/view/77
5. Gutlapalli, S. S., Mandapuram, M., Reddy, M., & Bodepudi, A. (2019). Evaluation of Hospital Information Systems (HIS) regarding their Suitability for Tasks. Malaysian Journal of Medical and Biological Research, 6(2), 143–150. https://doi.org/10.18034/mjmbr.v6i2.661