Face Recognition System
Face Recognition System
CHAPTER 1
INTRODUCTION
Information Technology has always been considered a major pain point of enterprise
organizations, from the perspectives of both cost and management. However, the information
technology industry has experienced a dramatic shift in the past decade factors such as
hardware commoditization, open-source software, virtualization, workforce globalization, and
agile IT processes have supported the development of new technology and business models.
Imagine yourself in the world where the users of the computer of todays internet world dont
have to run, install or store their application or data on their own computers, imagine the world
where every piece of information or data would reside on the Cloud (Internet).
As a metaphor for the Internet, "the cloud" is a familiar client, but when combined with
"computing", the meaning gets bigger and fuzzier. Some analysts and vendors define cloud
computing narrowly as an updated version of utility computing: basically virtual servers
available over the Internet. Others go very broad, arguing anything to consume outside the
firewall is "in the cloud", including conventional outsourcing.
Cloud computing is currently one the most hyped IT innovation Cloud computing technology is
a new concept, which provides great opportunities in many areas. Cloud computing is a
collection of computers and servers that are publically accessible via internet . Cloud computing
allows consumers and businesses to use applications without installation and access their
personal files at any computer with internet access. Cloud computing provides the variety of
internet based on demand services like software, hardware, server, infrastructure and data
storage.
National Institute of Standard and Technology (NIST) describes cloud computing with five
essential characteristics such as on-demand self-service, broad network access, rapid elasticity,
measured service, and resource pooling, three service models such as Software as a Service
(SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) and also four
deployment models such as public, private, community, and hybrid
1.1 Characteristics
1) On-demand self-service Cloud provides all needed computing resources as per requirement
to user.
2) Broad network access User can access cloud services using desktop, laptop, mobile phone
etc. over the internet
3) Resource pooling Cloud provider schedules resources to the user as per their requirement.
1.2 Services
1) Software as a Service (SaaS) In the SaaS model, cloud provider delivers application
softwares like MS-OFFICE, Turbo C etc. as a service to cloud user
2) Platform as a service (PaaS) In PaaS model, cloud provider deliver a computing platform
like operating system, database, web server etc. to the cloud user.
3) Infrastructure as a Service (IaaS) Main objective of any company is to reduce time and
money. IaaS model is used to fulfill these primary objectives.
Multi-tenancy enables sharing of resources and costs among a large pool of users, allowing
for: (gt)
o Centralization of infrastructure in areas with lower costs (such as real estate,
electricity, etc.)
o Peak-load capacity increases (users need not engineer for highest possible loadlevels)
o Utilization and efficiency improvements for systems that are often only 10-20%
utilized.
Reliability improves through the use of multiple redundant sites, which makes it suitable for
business continuity and disaster recovery. Nonetheless, most major cloud computing services
have suffered outages and IT and business managers are able to do little when they are
affected.
Scalability via dynamic ("on-demand") provisioning of resources on a fine-grained, selfservice basis near real-time, without users having to engineer for peak loads. Performance is
Sustainability comes about through improved resource utilization, more efficient systems,
and carbon neutrality. Nonetheless, computers and associated infrastructure are major
consumers of energy.
CHAPTER 2
BIOMETRICS
The information age is quickly revolutionizing the way transactions are completed. Everyday
actions are increasingly being handled electronically, instead of with pencil and paper or face
to face. This growth in electronic transactions has resulted in a greater demand for fast and
accurate user identification and authentication. Access codes for buildings, banks accounts and
computer systems often use PIN's for identification and security clearences.
CHAPTER 3
SYSTEM ANALYSIS
All the mentioned techniques before tend to tell us that none of it is feasible & not much useful
due to its various drawbacks. To overcome drawbacks of all these security techniques and to
provide proper security for user authentication in cloud computing, we proposed to use a
biometric technique called FACE RECOGNITION.
CHAPTER 4
ARCHITECTURE OF FACE RECOGNITION SYSTEM
Face recognition is a biometric security system. As the name suggests the face acts as a password
for the systems. Face recognition security system is shown in the figure 2. Where, we proposed
authentication scheme using face recognition system (FRS).
4.2 Advantages
In this proposed system, there are security advantages as stated below,
1) Non-intrusive
4.3 Applications
Border control
Voting system
Computer security
CONCLUSION
The services of cloud computing is based on the sharing. Cloud computing provides variety of
services like Iaas, SaaS, and PaaS. These services are paid services, so security is a major
REFERENCES