IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

SECURE YOUR ENTRY WAYS: USING CLOUD BASED DOOR ACCESS SYSTEM

AUTHORS:
Jayshree Rajendra Sanap, Aditya Sharad Sanap , Omkar Dnyaneshwar Dighole, Neha Kishor Salve
Mentor
Prof. Bharti M. Gawale
Affiliation
Department of Computer Engineering, Loknete Gopinathji Munde Institute of Engineering Education and Research
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
- In this paper, we emphasize the protection of entry points through a cloud-based door access system based on our earlier conceptual design to provide a fully developed prototype. Meeting today's security demands, the system takes advantage of IoT technology for effective visitor tracking and access control in residential and commercial buildings. The model deployed employs a Raspberry Pi as the processing unit, coupled with a Pi camera that takes real-time photographs of visitors when the doorbell is pressed. The photographs are sent in real-time to a Dropbox cloud server, where they are stored securely encrypted, providing tamper-proof digital records for future authentication [3]. The system increases post-conflict security by being able to keep log records of current activities, which can be presented electronically in times of conflict or incidents. Managed through a mobile app, authorized personnel are able to control visitor access remotely, receiving real-time alerts and images to make the decision whether to grant entry. This ensures safe and verified access control. Cloud integration offers scalability and remote management across numerous properties through a single platform [2]. The deployed prototype, which was put to the test in a simulated setting, boasts high reliability, with 97% accuracy in fingerprint authentication and a response time of 2 seconds. This "Secure Your Entry Ways: Using Cloud-Based Door Access System" integrates IoT technology, mobile app control, and safe cloud storage to present a dependable, effective solution for contemporary security requirements, real-time monitoring, safe record-keeping, and distant management, improved user convenience and security.

 
Keywords
IOT Door Lock Cloud Computing Security Biometric Authentication Fingerprint Sensor Raspberry Pi.
Article Metrics
Article Views
19
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

Salve, J. R. S. A. S. S. ,. O. D. D. N. K. (2026). Secure Your Entry Ways: using Cloud Based Door Access System. International Journal of Science, Strategic Management and Technology, Volume 10(01). https://doi.org/10.55041/ijsmt.v2i2.054

Salve, Jayshree. "Secure Your Entry Ways: using Cloud Based Door Access System." International Journal of Science, Strategic Management and Technology, vol. Volume 10, no. 01, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i2.054.

Salve, Jayshree. "Secure Your Entry Ways: using Cloud Based Door Access System." International Journal of Science, Strategic Management and Technology Volume 10, no. 01 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i2.054.

References

  1. [1].Arka  A, Saroj H, Rayith B, Shuvadeep P, Sourav H, Jayanta P, Arindam D, "Design and Implementation of an IoT-ased Smart Home Automation System in Real-World Scenario"In EAI Endorsed Transactions on Internet of Things, Volume 10, pages 1-8, 2024, doi:10.4108/etiot.6201.

  2. [2]. Amin S. Ibrahim, Waelm. F, Abdel-Rehim ,Ahmedm.Abbas ,Ashraf Mohamedali Hassan, Ahmed Emam and Saeed Mohsen, "Design and Implementation of a Pilot Model for IoT Smart Home Networks," IEEE Access, vol. 11, pp. 59701–59718, June 2023, doi:10.1109/ACCESS.2023.3282095.

  3. [3]. Muhammad Imran Zulfiqar , Ijaz Younis," Enhanced security paradigms: Converging IoT and

  4.  biometrics for advanced locker protection," in IEEE Internet of Things Journal, IEEE, 2024, pp. 1–10, doi :10.1109/JIOT.2024.3432282.

  5. [4]. H. -B. Kim, N. Choi, H. -J. Kwon and H. Kim, "Surveillance System for Real-Time HighPrecision Recognition of Criminal Faces From Wild Videos," in IEEE Access, vol. 11, pp. 56066-56082, 2023, doi:10.1109/ACCESS.2023.3282451.

  6. [5]. L. P. O. Paula, N. Faruqui, I. Mahmud, M. Whaiduzzaman, E. C. Hawkinson and S. Trivedi, "

  7. A Novel Front Door Security (FDS) Algorithm Using GoogleNet-BiLSTM Hybridization," in IEEE Access, vol. 11, pp. 19122-19134, 2023, doi:10.1109/ACCESS.2023.3248509.

  8. [6]. Z. Huang, J. Zhang and H. Shan, "When Age-Invariant Face Recognition Meets Face Age Synthesis:

  9. A Multi-Task Learning Framework and a New Benchmark," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 6, pp. 7917-7932, 1 June 2023, doi: 10.1109/TPAMI.2022.3217882.

  10. [7]. A. Krishnan and T. Thomas, "Finger Vein Recognition Based on Anatomical Features of Vein Patterns,

  11. " in      IEEE     Access,             vol.      11,       pp.       39373-39384,23, doi:10.1109/ACCESS.2023.3253203.

  12. [8]. Y. Huang, H. Ma and M. Wang, "Multimodal Finger Recognition Based on Asymmetric Networks With Fused Similarity," in IEEE Access, vol. 11, pp. 17497-17509, 2023, doi: 10.1109/ACCESS.2023.3242984. International Journal of Research Publication and Reviews, Vol 5, no 3, pp 2033-2038 March 2024 2038.

  13. [9]. C. -Y. Lin, F. -J. Chen, H. -F. Ng and W. -Y. Lin, "Invisible Adversarial Attacks on Deep Learning- Based Face Recognition Models," in IEEE Access, vol. 11, pp. 51567-51577, 2023, doi:10.1109/ACCESS.2023.3279488

  14. [10]. D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, O. Dobre, and H. V. Poor, "6G Internet of Things: A comprehensive survey," IEEE Internet Things J., vol. 9, no. 1, pp. 359–383, Jan. 2022.

Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Dynamic AI-Geofencing: Secure and Efficient Edge-Cloud Frameworks
string(68) "Dr. Hirdesh Sharma,Kaushal Pratap Singh, Vishesh Singh, Rounak Kumar" Kumar, D. H. S. P. S. V. S. R.
(2026)
DOI: 10.55041/ijsmt.v2i2.006
Real-Time Farming Guidance Via Conversational AI
string(16) "VALLAPU SURENDRA" SURENDRA, V.
(2026)
DOI: 10.55041/ijsmt.v2i2.133
Analysis of Non Performing Assets (NPA) in Indian Public Sector Banks
string(18) "Neha P. Chatterjee" Chatterjee, N. P.
(2026)
DOI: 10.55041/ijsmt.v2i2.006
Scroll to Top