Secure Your Entry Ways: Using Cloud Based Door Access System
- Version
- Download 12
- File Size 571.07 KB
- File Count 1
- Create Date 6 May 2025
- Last Updated 6 May 2025
Secure Your Entry Ways: Using Cloud Based Door Access System
Authors:
Miss. Jayshree Rajendra Sanap1, Mr. Aditya Sharad Sanap2, Mr. Omkar Dnyaneshwar Dighole3, Miss. Neha Kishor Salve4, Prof. Bharti M. Gawale5.
1,2,3,4,5 Department of Computer Engineering, Loknete Gopinathji Munde Institute of Engineering Education and Research, Nashik, India.
Abstract - In this paper, we emphasize the protection of entry points through a cloud-based door access system based on our earlier conceptual design to provide a fully developed prototype. Meeting today's security demands, the system takes advantage of IoT technology for effective visitor tracking and access control in residential and commercial buildings. The model deployed employs a Raspberry Pi as the processing unit, coupled with a Pi camera that takes real-time photographs of visitors when the doorbell is pressed. The photographs are sent in real-time to a Dropbox cloud server, where they are stored securely encrypted, providing tamper-proof digital records for future authentication [3]. The system increases post-conflict security by being able to keep log records of current activities, which can be presented electronically in times of conflict or incidents. Managed through a mobile app, authorized personnel are able to control visitor access remotely, receiving real-time alerts and images to make the decision whether to grant entry. This ensures safe and verified access control. Cloud integration offers scalability and remote management across numerous properties through a single platform [2]. The deployed prototype, which was put to the test in a simulated setting, boasts high reliability, with 97% accuracy in fingerprint authentication and a response time of 2 seconds. This "Secure Your Entry Ways: Using Cloud-Based Door Access System" integrates IoT technology, mobile app control, and safe cloud storage to present a dependable, effective solution for contemporary security requirements, real-time monitoring, safe record-keeping, and distant management, improved user convenience and security.
Key Words: IOT, Door Lock, Cloud Computing Security, Biometric Authentication, Fingerprint Sensor, Raspberry Pi.