CFP last date
15 January 2025
Call for Paper
February Edition
IJAIS solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 15 January 2025

Submit your paper
Know more
Reseach Article

Design and Implementation of an Open Ended Automated Vault Security System

by Saunak Mitra, Sarit Hati, Diganta Sengupta, Indraneel Datta, Pratim Sinha Roy, Soumyanil Banerjee
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 4
Year of Publication: 2012
Authors: Saunak Mitra, Sarit Hati, Diganta Sengupta, Indraneel Datta, Pratim Sinha Roy, Soumyanil Banerjee
10.5120/ijais12-450687

Saunak Mitra, Sarit Hati, Diganta Sengupta, Indraneel Datta, Pratim Sinha Roy, Soumyanil Banerjee . Design and Implementation of an Open Ended Automated Vault Security System. International Journal of Applied Information Systems. 4, 4 ( October 2012), 13-18. DOI=10.5120/ijais12-450687

@article{ 10.5120/ijais12-450687,
author = { Saunak Mitra, Sarit Hati, Diganta Sengupta, Indraneel Datta, Pratim Sinha Roy, Soumyanil Banerjee },
title = { Design and Implementation of an Open Ended Automated Vault Security System },
journal = { International Journal of Applied Information Systems },
issue_date = { October 2012 },
volume = { 4 },
number = { 4 },
month = { October },
year = { 2012 },
issn = { 2249-0868 },
pages = { 13-18 },
numpages = {9},
url = { https://www.ijais.org/archives/volume4/number4/291-0687/ },
doi = { 10.5120/ijais12-450687 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:47:19.157669+05:30
%A Saunak Mitra
%A Sarit Hati
%A Diganta Sengupta
%A Indraneel Datta
%A Pratim Sinha Roy
%A Soumyanil Banerjee
%T Design and Implementation of an Open Ended Automated Vault Security System
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 4
%N 4
%P 13-18
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It has always been in human nature that he tends to keep his prized possession in a secured place, a place where he thinks it would be safe from the rest of the world. The technical knowledge of man has increased exponentially with time leading to breakthroughs in modern security system. As every domain has witnessed pros and cons, hence the modern technology has also given rise to unethical developments in the arena of technically advanced security systems. The proposed system in this paper has been developed keeping in mind the vulnerabilities projected by the said technological advancement. A complex set of logic enhanced by competing software has been incorporated to design the work in concern. The said system has been termed as Open – Ended as the designated route to the vault is open for all to see, the trusted user as well as the trespassers. The beauty of the work is that even after knowing all the route combinations, only the authorized personnel can gain access to the vault. The novelty of the said work lies in the fact even if the authorized user is compromised by any means; he is bound to be trapped in the mesh structure surrounding the vault. The actual route to the vault is automatically generated by the software in a random manner, hence making it completely unpredictable for anyone, the creator of the system also, to predict the next accessible route to the vault through the mesh.

References
  1. K. NandaKumar, "Multibiometric Systems: Fusion Strategies and Template Security", PhD Thesis, Department of Computer Science and Engineering, Michigan State University, January 2008.
  2. Ratha, N. K. , J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Systems Journal, vol. 40, no. 3. Brown, L. D. , Hua, H. , and Gao, C. 2003.
  3. Jagadish H. Pujar, Lohit M. Kadlashkar, "A New Lossless Method of Image Compression and Decomposition using Huffman Coding", Journal of Theoretical and Applied Information Technology
  4. Walter J. Scheirer and Terrance E. Boult, "Cracking Fuzzy Vaults and Biometric Encryption", Securics Inc. and University of Colorado at Colorado Springs
  5. Manvjeet Kaur, Dr. Sanjeev Sofat, Deepak Saraswat, "Template and Database Security in Biometrics System : A Challenging Task", International Journal of Computer Applications, number 5, article 1, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Automated Vault Security System Security System Logic based Security System Open Ended Security System