Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

May Edition 2020

International Journal of Applied Information Systems solicits high quality original research papers for the May 2020 Edition of the journal. The last date of research paper submission is April 15, 2020.

Design and Implementation of an Open Ended Automated Vault Security System

Saunak Mitra, Sarit Hati, Diganta Sengupta, Indraneel Datta, Pratim Sinha Roy, Soumyanil Banerjee Published in Security

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
10.5120/ijais12-450687
Download full text
  1. Saunak Mitra, Sarit Hati, Diganta Sengupta, Indraneel Datta, Pratim Sinha Roy and Soumyanil Banerjee. Article: Design and Implementation of an Open Ended Automated Vault Security System. International Journal of Applied Information Systems 4(4):13-18, October 2012. BibTeX

    @article{key:article,
    	author = "Saunak Mitra and Sarit Hati and Diganta Sengupta and Indraneel Datta and Pratim Sinha Roy and Soumyanil Banerjee",
    	title = "Article: Design and Implementation of an Open Ended Automated Vault Security System",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 4,
    	number = 4,
    	pages = "13-18",
    	month = "October",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

It has always been in human nature that he tends to keep his prized possession in a secured place, a place where he thinks it would be safe from the rest of the world. The technical knowledge of man has increased exponentially with time leading to breakthroughs in modern security system. As every domain has witnessed pros and cons, hence the modern technology has also given rise to unethical developments in the arena of technically advanced security systems. The proposed system in this paper has been developed keeping in mind the vulnerabilities projected by the said technological advancement. A complex set of logic enhanced by competing software has been incorporated to design the work in concern. The said system has been termed as Open – Ended as the designated route to the vault is open for all to see, the trusted user as well as the trespassers. The beauty of the work is that even after knowing all the route combinations, only the authorized personnel can gain access to the vault. The novelty of the said work lies in the fact even if the authorized user is compromised by any means; he is bound to be trapped in the mesh structure surrounding the vault. The actual route to the vault is automatically generated by the software in a random manner, hence making it completely unpredictable for anyone, the creator of the system also, to predict the next accessible route to the vault through the mesh.

Reference

  1. K. NandaKumar, "Multibiometric Systems: Fusion Strategies and Template Security", PhD Thesis, Department of Computer Science and Engineering, Michigan State University, January 2008.
  2. Ratha, N. K. , J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Systems Journal, vol. 40, no. 3. Brown, L. D. , Hua, H. , and Gao, C. 2003.
  3. Jagadish H. Pujar, Lohit M. Kadlashkar, "A New Lossless Method of Image Compression and Decomposition using Huffman Coding", Journal of Theoretical and Applied Information Technology
  4. Walter J. Scheirer and Terrance E. Boult, "Cracking Fuzzy Vaults and Biometric Encryption", Securics Inc. and University of Colorado at Colorado Springs
  5. Manvjeet Kaur, Dr. Sanjeev Sofat, Deepak Saraswat, "Template and Database Security in Biometrics System : A Challenging Task", International Journal of Computer Applications, number 5, article 1, 2010.

Keywords

Automated Vault Security System, Security System, Logic based Security System, Open Ended Security System