Study of cloud computing security based on private face recognition

Chenguang Wang*, Huaizhi Yan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

17 Citations (Scopus)

Abstract

Supporting study of a method to solve cloud computing security issue with private face recognition. The method has three parts: user part provides face images; cloud initialization part has a face subspace and templates database; cloud private matching identification part contains the core algorithm of the method, comparing two encrypted numbers under double-encrypted conditions. The experimental results show the method can ensure that cloud neither know user's real face data, nor the face private matching identification result, to make user's face data secure, we develop a credible, efficient, low-complex method to guarantee cloud computing security.

Original languageEnglish
Title of host publication2010 International Conference on Computational Intelligence and Software Engineering, CiSE 2010
DOIs
Publication statusPublished - 2010
Event2010 International Conference on Computational Intelligence and Software Engineering, CiSE 2010 - Wuhan, China
Duration: 10 Dec 201012 Dec 2010

Publication series

Name2010 International Conference on Computational Intelligence and Software Engineering, CiSE 2010

Conference

Conference2010 International Conference on Computational Intelligence and Software Engineering, CiSE 2010
Country/TerritoryChina
CityWuhan
Period10/12/1012/12/10

Keywords

  • Cloud computing security
  • Face recognition
  • Private matching identification

Fingerprint

Dive into the research topics of 'Study of cloud computing security based on private face recognition'. Together they form a unique fingerprint.

Cite this