CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Protection of Classified Data through Role based Access Control using Human Authentication

by Deepika, Mamta, Natasha Soni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 14
Year of Publication: 2021
Authors: Deepika, Mamta, Natasha Soni
10.5120/ijca2021921456

Deepika, Mamta, Natasha Soni . Protection of Classified Data through Role based Access Control using Human Authentication. International Journal of Computer Applications. 183, 14 ( Jul 2021), 12-16. DOI=10.5120/ijca2021921456

@article{ 10.5120/ijca2021921456,
author = { Deepika, Mamta, Natasha Soni },
title = { Protection of Classified Data through Role based Access Control using Human Authentication },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2021 },
volume = { 183 },
number = { 14 },
month = { Jul },
year = { 2021 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number14/31993-2021921456/ },
doi = { 10.5120/ijca2021921456 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:16:46.672632+05:30
%A Deepika
%A Mamta
%A Natasha Soni
%T Protection of Classified Data through Role based Access Control using Human Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 14
%P 12-16
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data is the most significant and essential entity to every organization. Companies invest millions of dollars in order to protect and manage the access to their data. The privacy and confidentiality of any data could be easily determined from the fact that the sensitivity of organizational data is because of its profit figures, business revenues etc. If it’s being misused then an organizations have to bear a heavy loss. So to protect our data and storage we take the precautionary measures to the next level. We validate and restrict the access to the database according to the roles assigned to the human beings for records accessing rights, on the basis of their facial features by using Eigenface algorithm Face recognition is a pattern recognition task performed specifically face either "known" or "unknown", after comparing it with stored known people. It is also desirable to have a system that has the ability of learning to recognize unknown faces. So when administrator inhibit details of employee then it will save in our database and the program will be asked to capture the image of the employee it takes 100 images per person and trained them and then store in training set after validation of image only then employee can further do work according to the roles assigned by administrator . In this way our database is secured using facial recognition.

References
  1. https://en.wikipedia.org/?title=Face_detection
  2. Elisa Bertino, Moustafa A. Hammad, Walid G. Aref , Ahmed K. Elmagarmid, “An Access Control Model for Video Database Systems”, Proceedings of the ninth international conference on Information and knowledge management, 2000, pp. 336 – 343.
  3. Naren Kodali, Csilla Farkas, Duminda Wijesekera, “An authorization model for multimedia digital libraries”, International Journal on Digital Libraries, vol. 4, no. 3, 2004, pp. 139-155
  4. Béchara Al Bouna, Richard Chbeir, “Multimedia-based authorization and access control policy specification”, Proceedings of the 3rd ACM workshop on Secure Web Services, 2006, pp. 61–68.
  5. Shermann S.M. Chan, Qing Li, José A. Pino, “Access Control Mechanism for Collaborative Video Database Production Applications”, Proceedings of IEEE Sixth International Symposium on Multimedia Software Engineering, 13-15 Dec. 2004, pp. 396- 402.
  6. Iqra Basharat,” Database Security and Encryption: A Survey Study “, International Journal of Computer Applications (0975 – 888) Volume 47– No.12, June 2012
  7. Sneha Arora, Rajiv Munjal, “Database Security Based on Human Authentication Using Facial Recognition”, IJARCSSE, Volume 4, Issue 7, July 2014 , ISSN: 2277 128X.
Index Terms

Computer Science
Information Sciences

Keywords

Database security PCA face recognition