Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (7): 15-17    DOI:
Current Issue | Archive | Adv Search |
Design of the Cloud Storage Authentication System Based on Fingerprint Identification
Yao Bingying1,Li Chuanqing1,Li Chao2
Guangzhou Huaxia Vocational College Guangdong Institute of Science and Technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  For the lower safety problem in the "static password + real-time data" authentication modes of WEB cloud storage system, this paper designs an authentication system based on fingerprint identification technology. It uses the authentication model based on fingerprint identification for user identity authentication, improving the authentication security and reliability, and solving the issues of user account illegal access and tampering. It proposes the hybrid encryption algorithm based on symmetric encryption algorithm and asymmetric encryption algorithm which is used as a identity authentication protocol. This method effectively improves the certification efficiency, and realizes the effective transmission of huge amounts of data. The experimental results show that the scheme obtains very good application in the cloud storage identity authentication system.
Key wordscloud storage      fingerprint identification      identity authentication      SSL certification agreement      mixed encryption      security     
Published: 13 November 2017
:  TP391.41  

Cite this article:

Yao Bingying, Li Chuanqing, Li Chao. Design of the Cloud Storage Authentication System Based on Fingerprint Identification. Computer & Telecommunication, 2016, 1(7): 15-17.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2016/V1/I7/15

[1] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[2] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[3] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[4] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[5] HE Zhen-xiang WANG Li-ying.
The Governance Problems and Countermeasures of Network Space
from the Angle of Investigation and Evidence Collection
[J]. 电脑与电信, 2022, 1(1-2): 36-39.
[6] YE Dong CHEN Chun-tao LI Zong-chen LI Jun-yao. Research on the School-Bureau-Enterprise Collaborative Education Model in the Major of Public Security Audio-visual Technology[J]. 电脑与电信, 2021, 1(8): 30-32.
[7] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[8] HAN Hai. An Integrated Security Monitoring Solution in the Judicial Field Based on 5G Private Network[J]. 电脑与电信, 2021, 1(6): 76-78.
[9] FANG Xin. Research on Security of Rip Routing Protocol Based on Python[J]. 电脑与电信, 2021, 1(5): 1-21.
[10] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[11] YUAN Jing.
Research on the Resource Library Model of Database Course Based on Cloud Storage
[J]. 电脑与电信, 2021, 1(12): 50-52.
[12] LAI Jin-zhi.
Research and Practice of Network Security Management of Industrial Control System
Based on PDCA Circulation
[J]. 电脑与电信, 2021, 1(11): 12-15.
[13] GONG Jian-feng.
Research on Cloud Security Evaluation Model Based on Data Mining
[J]. 电脑与电信, 2021, 1(11): 95-.
[14] YE Hui-qing.
Discussion on Application of 5G Customized Private Network for Vertical Industry
[J]. 电脑与电信, 2021, 0(10): 64-66.
[15] LI Ling. Cloud Storage Construction of Teaching Files in University Computer Room Based on ownCloud[J]. 电脑与电信, 2021, 1(1): 30-33.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd