ABOUT CUSTOMER
This is an innovative online platform designed to help you connect with like-minded individuals who share your interests and personality traits. Leveraging advanced AI technology, It provides personalized recommendations for potential friends, ensuring compatibility and mutual understanding.
Current Infrastructure
Using web platform on AWS, utilizing EC2 instances for servers and RDS for databases. Authentication primarily relies on traditional methods such as passwords and two-factor authentication (2FA) via SMS or email. Security measures include HTTPS encryption for data transmission and regular security audits. Despite its robust infrastructure, It faces challenges with security breaches and user experience friction during authentication. To address these issues, It is exploring innovative solutions like Amazon Recognition for facial recognition-based authentication to enhance security and streamline the authentication process, ensuring a seamless and secure experience for its users.
The Challenge
Here are the challenges faced when the Amazon Recognition service is not implemented:
- Limited image and video analysis capabilities without Amazon Recognition.
- Reliance on manual image processing methods, increasing workload and reducing operational efficiency.
- Challenges in implementing advanced features like image-based search and content moderation.
- Prolonged development time and higher maintenance costs for custom solutions.
- Risk of inaccurate results compared to mature AI-powered services.
- Difficulty integrating image analysis functionalities with other AWS services.
The Solution
Amazon Cognito, AWS Lambda, and Amazon API Gateway play crucial roles in integrating with Amazon Recognition to create a comprehensive and scalable solution for image and video analysis. Here’s how each service contributes:
- Implementing Amazon Recognition:
- Integrated Recognition into authentication for facial recognition-based login.
- Leveraged Recognition's facial analysis for secure user identity verification.
- Enhanced Authentication with Amazon Cognito:
- Used Cognito for user authentication and secure identity storage.
- Integrated Cognito with Recognition for seamless facial recognition authentication.
- Serverless Architecture with AWS Lambda:
- Implemented serverless architecture using Lambda for authentication and Recognition interaction.
- Lambda functions processed user images triggered by login attempts for facial recognition.
- Real-Time Monitoring with Amazon CloudWatch:
- Set up CloudWatch alarms to monitor authentication events.
- Utilized CloudWatch logs and metrics for real-time insights into system performance and user behaviour.
- Amazon Cognito:
- Manages user authentication and authorization, ensuring secure Recognition access.
- AWS Lambda:
- Preprocesses data and handles authentication requests for Recognition.
- Amazon API Gateway:
- Creates and manages RESTful APIs for seamless Recognition integration, ensuring scalability and flexibility.
Scalability and Infrastructure Management
- Amazon EC2 Auto Scaling: Implement EC2 Auto Scaling to automatically adjust compute resources based on demand. This ensures optimal performance and cost-efficiency during varying traffic conditions.
- Elastic Load Balancing (ELB): Deploy Elastic Load Balancing to distribute incoming traffic across multiple Amazon EC2 instances. This setup will enhance the application's availability and reliability, providing a seamless user experience.
- Amazon CloudWatch: Set up Amazon CloudWatch for comprehensive monitoring and management of application performance. CloudWatch will provide real-time insights and alerts, enabling proactive identification and resolution of potential issues.
Security
- We have implemented an AWS WAF and all the traffic from the internet is coming through WAF towards infra
- All the important instances are in the private subnet so that public access can't be achieved.
- For the developer, VPN is provided to access the infra for development-related management and upgradations.
- IAM, KMS and Secret Manager are also deployed to handle the access management and security of the cryptographic data
- MFA is deployed to ensure the verified access on the infrastructure.
- The infrastructure is well architected and as per the best practices of the AWS to achieve the security.
Resiliency
- A multi-AZ infrastructure has been architected for this customer.
- Snapshots are being taken properly with a defined frequency and kept within S3, as-per-required retention period.
Solution/Architecture Diagram

Why AWS?
AWS is designed to allow application providers, ISVs, and vendors to quickly and securely host your applications – whether an existing application or a new SaaS-based application. You can use the AWS Management Console or well-documented web services APIs to access AWS's application hosting platform. AWS utilizes an end-to-end approach to secure and harden our infrastructure, including physical, operational, and software measures. For more information, see the AWS Security Center.
Using AWS tools, Auto Scaling, and Elastic Load Balancing, your application can scale up or down based on demand. Backed by Amazon's massive infrastructure, you have access to compute and storage resources when you need them. With AWS, you take advantage of a scalable, reliable, and secure global computing infrastructure, the virtual backbone of Amazon.com's multi-billion-dollar online business that has been honed for over a decade.
Why i2k2?
As an AWS Advanced Consulting Partner & Managed Amazon cloud services provider, i2k2 provides comprehensive folio of cloud solutions along with prompt and reliable support. Our partnership with AWS goes several years back, even before we formalized our association with the company in 2013. Key reason to choose i2k2 was 20 years of proven business. Talent is vast due to extensive IT exposure in India.
About i2k2 Networks
i2k2 Networks is the No.1 Dedicated Web Hosting company in India and a trusted name in the IT cloud hosting services industry that offers a full gamut of cutting edge enterprise solutions which drive business in today's Internet-powered world. Our folio includes Dedicated Servers, Cloud Hosting- Public, Private and Hybrid, Data Center Services, Business Email Solutions, Managed IT Services, Backup, and DR Solutions, DevOps Services, Cloud Enablement, Enterprise Hardware solutions, and various other integrated services. A team of dedicated and professionally driven IT experts conversant with diverse client requirements are available 24x7x365 to provide extended support. With superior technologies to host, design and develop high-quality websites and applications, we ensure to deliver unmatched value to our clients.