Bio-cryptographic authentication in cloud storage sharing

被引:0
|
作者
Velciu, Marius-Alexandru [1 ]
Patrascu, Alecsandru [1 ]
Patriciu, Victor-Valeriu [1 ]
机构
[1] Mil Tech Acad, Dept Comp Sci, Bucharest, Romania
来源
2014 IEEE 9TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI) | 2014年
关键词
bio-cryptography; biometric encryption; fuzzy-vault algorithm; cepstral analysis; cloud computing; secure data storage; cloud computing access control;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One of the relative recent approaches for enhancing the modern cryptosystems security is to add the biometrics layer to the existing cryptographic infrastructures. The Biometric Encryption process proposes to combine the soft biometrics with existing cryptographic keys, overcoming many of the traditional biometric systems vulnerabilities. In this paper we propose a new and novel implementation for a bio-cryptographic infrastructure, as a safer authentication mechanism for Cloud storage sharing. We talk about the architecture of our approach and we emphasize the benefits brought by combining the two fields, such as storage encryption and access control. Our implementation resides on a voice-based authentication mechanism, which confers access to the system and allows the recovery of the shared access storage encryption key.
引用
收藏
页码:165 / 170
页数:6
相关论文
共 50 条
  • [1] BIO-CRYPTOGRAPHIC PROTOCOLS WITH BIPARTITE BIOTOKENS
    Scheirer, W. J.
    Boult, T. E.
    2008 BIOMETRICS SYMPOSIUM (BSYM), 2008, : 9 - 16
  • [2] A pitfall in fingerprint bio-cryptographic key generation
    Zhang, Peng
    Hu, Jiankun
    Li, Cai
    Bennamoun, Mohammed
    Bhagavatula, Vijayakumar
    COMPUTERS & SECURITY, 2011, 30 (05) : 311 - 319
  • [3] Methods of reducing bio-cryptographic algorithms computational complexity
    Velciu, Marius-Alexandru
    Patriciu, Victor-Valeriu
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2014, : 153 - 158
  • [4] A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
    Xi, Kai
    Ahmad, Tohari
    Han, Fengling
    Hu, Jiankun
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (05) : 487 - 499
  • [5] A Bio-cryptographic framework for securing mobile devices content
    Velciu, Marius-Alexandru
    Patriciu, Victor-Valeriu
    Bica, Ion
    2016 IEEE 11TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2016, : 37 - 41
  • [6] A bio-cryptographic system based on offline signature images
    Eskander, George S.
    Sabourin, Robert
    Granger, Eric
    INFORMATION SCIENCES, 2014, 259 : 170 - 191
  • [7] Cryptographic Cloud Storage
    Kamara, Seny
    Lauter, Kristin
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6054 : 136 - 149
  • [8] Anonymous User Authentication with Secured Storage and Sharing Of Data on Cloud
    Karad, Manisha D.
    Vaidya, Milind B.
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 201 - 205
  • [9] Cryptographic Implementation of Aggregate-Key Encryption for Data Sharing in Cloud Storage
    Kendrekar, Priyanka P.
    Chavan, M. K.
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 829 - 832
  • [10] Fingerprint-Based Asymmetric Bio-Cryptographic Key Generation Using Convolution Network
    Maiti, Diptadip
    Basak, Madhuchhanda
    Das, Debashis
    FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 2, CIS 2023, 2024, 869 : 29 - 49