Secured data management using face detection and Video mode

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data security is protecting digital data, from the unwanted actions of unauthorized users, like cyberattack or data breach. Data is no longer said to be secure if it falls into the hands of hackers or those that would misuse it. Data is well secured and guarded within an organization. But, when its employees sell their access specifiers to their competitors, data is no longer protected. This could be avoided by advanced technology. The Identity-based approach is an approach to regulate access to a digital product or service based on the identity of an individual. This allows organizations to grant access to a variety of digital services using the same credentials, ensuring the accurate match between what users are entitled to and what they really receive, while also permitting other access constraints like company, device, location and application type(attributes) In our application, data is uploaded by an encryption format attached with the video mode and it is downloadable by the user only through the unique face detection mode. When a user tries to download the encrypted file, a notification is sent to four admins for better privacy reasons. Only upon acceptance from four of these admins, the file could be downloaded. The admins can authenticate the user using his face captured through face detection. This could be used at any level in an organization but is much efficient when no of users trying to access a file is limited. This provides high security and rejects unauthorized users. Breach of data leads to a decline in profits and incline in losses. This could be reduced if the data security could be ensured using face detection of a person who is trying to access the data.

Cite

CITATION STYLE

APA

Kalapana*, Dr. B., Manaswini*, A. K., … Srilekha, K. (2020). Secured data management using face detection and Video mode. International Journal of Innovative Technology and Exploring Engineering, 9(7), 1222–1224. https://doi.org/10.35940/ijitee.g5805.059720

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free