skip to main content
10.1145/3647444.3647861acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

Image Based Security System in cloud resource Scheduling

Published: 13 May 2024 Publication History

Abstract

Abstract: The popularity of cloud computing in scheduling work processes, particularly logical work processes, is growing. The cloud computing environment may encounter significant issues with execution time and cost during resource allocation, resulting in disruptions in customer support quality. Text Passwords are right now a totally utilized insistence part, however graphical passwords and biometrics are likewise utilized. However, we really want to improve both comfort and security in any system to make it extremely secure. Image-based security systems leverage visual information and image processing techniques to enhance security measures. These systems use images or video streams from cameras to monitor, detect, and respond to security threats. Most likely, the framework employs our algorithm to improve performance. It utilizes parts of both Graphical and Text Secret phrase plans. Advanced image processing algorithms analyze captured images for various security-related purposes, such as object detection, facial recognition, and anomaly detection. In contrast to the most well-known scheduling algorithms, such as multi-objective scheduling (MOS) and cost-conscious scheduling, the various scheduling algorithms in this proposed hybrid algorithm mannequin are used to make cloud services secure and highly available to end users. Identifying and verifying individuals based on facial features. This is used for access control, identity verification, and tracking individuals of interest. Analyzing images to detect unauthorized persons or objects in restricted areas, triggering alerts or alarms. In this investigation, we attempt to demonstrate the execution of various algorithm systems for the most well-known three static booking calculations. All the calculations are working out the all-out execution cost and timing of various calculations.

References

[1]
Robert Biddle, Sonia Chiasson, and P.C. Van Oorschot. Graphical passwords: Learning from the first twelve years. ACM Comput. Surv., 44(4):19:1{ 19:41, September 2012.
[2]
M. N. Doja and Naveen Kumar. Image authentication schemes against keylogger spyware. In Proceedings of the 2008 Ninth ACIS International Conference on Software Engineering, Arti_cial Intelligence, Networking, and Parallel/Distributed Computing, SNPD '08, pages 574{579, Washington, DC, USA, 2008. IEEE Computer Society.
[3]
M.F. Theofanos and S.L. Peeger. Guest editors' introduction: Shouldn't all security be usable? Security Privacy, IEEE, 9(2):12{17, 2011.
[4]
R. Arun Raj, S.N. George, and P.P. Deepthi. An expeditious chaos based digital image encryption algorithm. In Recent Advances in Information Technology (RAIT), 2012 1st Interna tional Conference on, pages 14{18, 2012.
[5]
Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, and Nasir Memon. Passpoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum.-Comput. Stud., 63(1-2):102{127, July 2005.
[6]
Xiao Pan, Jianliang Xu, and Xiaofeng Meng. Protecting location privacy against location-dependent attacks in mobile services. IEEE Transactions on Knowledge and Data Engineering, 24(8):1506{1519, 2012.
[7]
Yue Sun and Guangyi Wang. An image encryption scheme based on modified logistic map. In Chaos-Fractals Theories and Applications (IWCFTA), 2011 Fourth International Workshop on, pages 179{182, 2011.
[8]
Ming Sun Fu and Oscar C Au. Joint visual cryptography and watermarking. In Multimedia and Expo, 2004. ICME'04. 2004 IEEE International Conference on, volume 2, pages 975{978. IEEE, 2004.
[9]
Zhi Hong Guan, Fangjun Huang, and Wenjie Guan. Chaos-based image encryption algorithm. Physics Letters A, 346(1):153{157, 2005.
[10]
Young Chang Hou and Pei Min Chen. An asymmetric watermarking scheme based on visual cryptography. In Signal Processing Proceedings, 2000. WCCC-ICSP 2000. 5th International Conference on, volume 2, pages 992{ 995. IEEE, 2000.
[11]
Rangaiah, Y. V., Sharma, A. K., Bhargavi, T., Chopra, M., Mahapatra, C., & Tiwari, A. (2022, December). A Taxonomy towards Blockchain based Multimedia content Security. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) (pp. 1-4). IEEE.
[12]
Rohinidevi, V. V., Srivastava, P. K., Dubey, N., Tiwari, S., & Tiwari, A. (2022, December). A Taxonomy towards fog computing Resource Allocation. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) (pp. 1-5). IEEE.
[13]
Singh, N. K., Jain, A., Arya, S., Gonzales, W. E. G., Flores, J. E. A., & Tiwari, A. (2022, December). Attack Detection Taxonomy System in cloud services. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) (pp. 1-5). IEEE.
[14]
Singh, Shubhuam, Pawan Singh, and Sudeep Tanwar. "Energy aware resource allocation via MS-SLnO in cloud data center." Multimedia Tools and Applications (2023): 1-23.
[15]
Vanhoeyveld, J., Martens, D., & Peeters, B. (2020). Value-added tax fraud detection with scalable anomaly detection techniques. Applied Soft Computing, 86, 105895.
[16]
Srivastava, P. K., Kumar, S., Tiwari, A., Goyal, D., & Mamodiya, U. (2023, June). Internet of thing uses in materialistic ameliorate farming through AI. In AIP Conference Proceedings (Vol. 2782, No. 1). AIP Publishing.
[17]
Dora Pravina, C. T., Buradkar, M. U., Jamal, M. K., Tiwari, A., Mamodiya, U., & Goyal, D. (2022, December). A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5).
[18]
Tiwari, A. & Sharma, R. M. (2021). Realm Towards Service Optimization in Fog Computing. In I. Management Association (Ed.), Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing (pp. 1530-1563).
[19]
Dudeja, D., Sabharwal, S. M., Ganganwar, Y., Singhal, M., Goyal, N., & Tiwari, A. (2023). Sales-Based Models for Resource Management and Scheduling in Artificial Intelligence Systems. Engineering Proceedings, 59(1), 43.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine Intelligence
November 2023
1215 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud Resources
  2. Cloud Security
  3. Image System
  4. Scheduling System
  5. Simulation tools

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 10
    Total Downloads
  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media