Secure Biometric-Based Authentication for Cloud Computing (original) (raw)
Related papers
Towards Biometric-based Authentication for Cloud Computing
2012
Cloud computing is an emerging technology that allows different service providers to offer services in an on-demand environment. Due to the advantages such as flexibility, mobility, and costs saving, the number of cloud user has increased tremendously. Consequently, a more secure and privacy preserving authentication system is becoming important to ensure that only the data owner or the authorized user can gain access and manipulate data stored in the cloud. In the current approach, the service provider authenticates its users based on the credential submitted such as password, token and digital certificate. Unfortunately, these credentials can often be stolen, accidentally revealed or hard to remember. In view of this, we propose a biometric-based authentication protocol, which can be used as the second factor for the cloud users to send their authentication requests. In our solution, the credential submitted by the users consists of the biometric feature vector and the verificatio...
Automated Biometric Authentication with Cloud Computing
Biometric-Based Physical and Cybersecurity Systems, 2018
The convenience provided by cloud computing has led to an increasing trend of many business organizations, government agencies and individual customers to migrate their services and data into cloud environments. However, once clients' data is migrated, the overall security control will be immedicably shifted form data owners to the hand of cloud service providers. In fact, most cloud clients do not even know where their data is physically stored, and therefore the question of how to limit data access to authorized users has been one of the biggest challenges in cloud environments. Although security tokens and passwords are widely used form of remote user authentication, they can be lost or stolen as they are not linked with the identity of data owner. Therefore, biometric based authentication can potentially offer a practical and reliable option for remote access control. This chapter starts with a brief introduction that covers the fundamental concepts of cloud computing and biometric based authentication. It then provides and in-depth discussions on authentication challenges for the cloud computing environment and the limitation of traditional solutions. This leads to the key sections related to biometric solutions for cloud computing in which we present state-of-art approaches that offer convenient and privacy-preserving authentication needed for cloud environment. The chapter argues that addressing privacy concerns surrounding the use of biometrics in cloud computing is one of the key challenges that has to be an integral part of any viable solution for any biometric-based authentication. It also argues that assuring cloud clients that their biometric templates will not be used without their permission to, for example, track them is not enough. Such solutions should make it technically infeasible to do so even if a cloud service provider wants to. This chapter explains a number of interesting solutions that have been recently proposed to improve security and, at the same time, maintain user privacy. Finally, we identify some challenges that still need to be addressed and highlight relevant Research Directions.
IJERT-Efficient and Comprehensive Framework for Cloud Services-based Biometric Authentication
International Journal of Engineering Research and Technology (IJERT), 2021
https://www.ijert.org/efficient-and-comprehensive-framework-for-cloud-services-based-biometric-authentication https://www.ijert.org/research/efficient-and-comprehensive-framework-for-cloud-services-based-biometric-authentication-IJERTCONV9IS05020.pdf Rather than an on location server cloud services will be services that are accessible from a dispersed cloud stockpiling worker. These measured frameworks are worked by an outsider and give clients access to PC assets, for example, investigation or systems administration over the Internet. Cloud Computing is utilized to give processing assets over the Internet and is utilized to store information on cloud workers. Security and information insurance have been a critical field of interest in cloud processing because of the sharing of assets. Cloud service suppliers store and hold client data through server farms that are influenced by information spillage.. It is observed that many mechanisms have stressed data protection and have neglected privacy in the subsequent process. Authentication aids with preserving and verifying the identity of a recipient. We also suggest an effective technique to use two biometric models for safe message transmission to create a session key between two interacting parties. Finally, the reliability and utility of the proposed solution was seen by detailed trials and a comparative analysis. Index Terms-Authentication, biometric-based security, cloud service access, session key.
A Proposed Biometric Authentication Model to Improve Cloud Systems Security
Computer Systems Science and Engineering
Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users' information. The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy, sensitivity, and specificity. The research study introduces a novel algorithm called "Bio_Authen_as_a_Service" for implementing and evaluating the proposed model. The proposed system performs the biometric authentication process securely and preserves the privacy of user information. The experimental result was highly promising for securing cloud services using the proposed model. The experiments showed encouraging results with a performance average of 93.94%, an accuracy average of 96.15%, a sensitivity average of 87.69%, and a specificity average of 97.99%.
Secure crypto-biometric system for cloud computing
2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011
Cloud computing has achieved maturity, and there is a heterogeneous group of providers and cloud-based services. However, significant attention remains focused on security concerns. In many cases, security and privacy issues are a significant barrier to user acceptance of cloud computing systems and the advantages these offer with respect to previous systems. Biometric technologies are becoming the key aspect of a wide range of secure identification and personal verification solutions, but in a cloud computing environment they present some problems related to the management of biometric data, due to privacy regulations and the need to trust cloud providers. To overcome those problems in this paper, we propose a cryptobiometric system applied to cloud computing in which no private biometric data are exposed.
Biometric Authentication and Data Security in Cloud Computing
Computer and Network Security Essentials, 2017
The migration, from local to web applications, is probably one of the most significant advances of the recent years in the arena of the application software: sharing critical data and resources and giving support to multi-user/multi-tenancy scenarios. The development of service-oriented architectures (SOA) and WEB services are key issues in all frameworks. SOAs support designing and developing in terms of services with distributed capabilities, which can be under the control of different ownership domains. These architectures are essentially a collection of services or, in different terms, entities performing single or a limited number of repeatable activities and communicating with each other by simple data passing. Service consumers view a service provider as a communication endpoint supporting a particular request format or contract; this request format (or interface) is always separated from the service implementation. As a matter of course, security breaches on web applications are a major concern because they can involve both enterprise and private customer data: protecting these assets is then an important part of any web application development. This process usually includes authentication and authorization steps, asset handling, activity logging, auditing. A variety of protection mechanisms has been developed,
Cloud Computing Security and Biometrics
International Journal for Research in Applied Science and Engineering Technology, 2018
With the increased usage of cloud computing, there is a need to address the security issues also. No. of techniques have been proposed and is there in use. Still there are few problems related to authentication in cloud environment. This paper throws a light on such problems and their solution with the use of Biometric techniques.
Implementation of a biometric authentication layer for a public cloud.
International Journal of Natural and Applied Sciences (IJNAS), 2015
Biometric authentication method is a scheme that can be incorporated into traditional method of securing public cloud. Securing the cloud is an important task and critical aspect as it faces numerous security issues and challenges. Compromise of user’s account has been a bottleneck in recent years, thus hindering the wide acceptance of cloud technology. The aim of this research work is to avoid compromise of users account from malicious hackers within cloud formations. This research project reviewed existing security issues and challenges faced by cloud providers’ and users. Object oriented analysis and design was adopted in developing a multi-layer authentication platform for cloud users to avoid compromise. An open application programming interface (API) source code from Digital Persona was deployed in order to increase the biometric (thumb print) check of the security status for client username/password. A test bench questionnaire to weight the working of the designed platform was considered.
A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud
Rapid development of smart technologies enables use of cloud service for large-scale data storage. Remote access of original data as well as biometric data from cloud storage enhances several challenges. It is inevitable to prevent unauthorized access of data stored in cloud. Biometrics authentication is more efficient than the known traditional authentication mechanisms. Authentication is a major security feature used to protect data privacy, whereas additional security features used to protect data may adversely affect it. There must be a balance between security and privacy during secure authentication design. Here a survey of security and privacy issues for biometrics based remote authentication in cloud is briefly presented and the research gaps are identified to attract more research on this domain in near future.
Biometrics Authentication Technique in Cloud Computing
Cloud computing is an important for the corporate sector due to its architecture and feasibility. But most of the enterprises not showing their proper interest in this technology due the security issues and user authentication problems. In this paper we are proposing the user authentication technique modal using biometrics in cloud computing. So only authenticate user can able to access the services of cloud by using biometrics thumb impression.