A Survey on Using Biometrics for Cloud Security

  • Authors

    • K Ruth Ramya
    • D N.V.Saikrishna
    • T Sravya Nandini
    • R Tanmai Gayatri
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15701
  • Biometrics, Cloud data encryption, Finger print, Cloud security, Attribute-based encryption.
  • Cloud computing the most emerging data storage and processing technology. Today many organizations are using cloud-based data storage because of their complex data management. Even though cloud is attracting many users towards using it but there is a requirement of security concerns to be taken care of because cloud is untrusted, the data which individual stores on cloud will be transparent to cloud administrator also which may be confidential. So, while using cloud security is the primary concern. In this paper, we proposed a scheme to encrypt cloud data using user attribute-based encryption. Which is a public key crypto technique in which key will be based on the attributes of user. The attributes we used are biometrics of user who is going to upload the data.

     

     

  • References

    1. [1] Iniya Shree, C. Vijesh Joe, K. Narmatha, S. Shinly Swarna Sugi “Providing Biometrics Security for Load Balanced Cloud Data Storage†Middle-East Journal of Scientific Research.

      [2] A.K. Jain, L. Hong, R. Bolle, “On-line Fingerprint verificationâ€, IEEE Trans. Pattern Anal. Mach. Intel.

      [3] Michael Goh Kah Ong, Tee Connie, Andrew Teoh Beng Jin, David Ngo Chek Ling, “A single-sensor hand geometry and palm print verification systemâ€, Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications, Berkley, Cali-fornia, 2003.

      [4] Steve Lawrence C. Lee Giles Ah Chung Tsoi, Andrew D. Back, “Face Recognition: A Convolutional Neural Network Approachâ€, IEEE Transactions on Neural Networks, Special Issue on Neural Networks and Pattern Recognition.

      [5] Boneh D., Di G., Ostrovsky R., Persiano G. (2004), “Public key encryption with keyword searchâ€, Advances in Cryptology-Euro crypt, Springer, Berlin/Heidelberg, pp 506–522.

      [6] Christian Holz, Frank R. Bentley, “On-Demand Biometrics: Fast Cross-Device Authenticationâ€, #chi4good, CHI 2016, San Jose, CA, USA.

      [7] Mohammed Nasir Uddin, Selina Sharmin, Abu Hasnat Shohel Ahmed and Emrul Hasan, Shahadot Hossain and Muniruzzaman, “A Survey of Biometrics Security System†IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10.

      [8] Dhiraj Sunehra, “Fingerprint Based Biometric ATM Authenti-cation Systemâ€, International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 3, Issue 11.

      [9] Shah Faisal Darwaish, Esmiralda Moradian, Tirdad Rahmani, Martin Knauer, “Biometric identification on android smartphonesâ€, Science Direct – Procedia computer science.

      [10] Inass SH. Hussein and Md Jan Nordin, “Palm Print verifica-tion using invariant moments based on wavelet transformâ€, Journal of Computer Science.

  • Downloads

  • How to Cite

    Ruth Ramya, K., N.V.Saikrishna, D., Sravya Nandini, T., & Tanmai Gayatri, R. (2018). A Survey on Using Biometrics for Cloud Security. International Journal of Engineering & Technology, 7(2.32), 307-311. https://doi.org/10.14419/ijet.v7i2.32.15701