Finger Print Authentication For Improved Cloud Security

被引:0
|
作者
Venakatesan, N. [1 ]
Kumar, M. Rathan [2 ]
机构
[1] Bharathiyar Coll Engn Technol, Dept Informat Technol, Karaikal, India
[2] PRIST Univ, Thanjavur, India
关键词
cloud computing; data security; image processing; bio-metric images; two-factor bio-metrics;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper explains about strengthening the security issues when a cloud user - an individual, an enterprise or any other entity ports all of its data to a cloud vendor so as to reduce the investment cost and to ensure secured data communication to and fro between the cloud user and the cloud vendor. The process of combining traditional user-id and password mechanism along with bio metric image processing technique-finger print recognition is thoroughly explored for improving security in public cloud infrastructure. The possibility of introducing a new cloud service as "Bio-metrics as a Service" is also explored.
引用
下载
收藏
页码:434 / 439
页数:6
相关论文
共 50 条
  • [21] Data Security and Authentication in Hybrid Cloud Computing Model
    Wang, Jingxin K.
    Jia, Xinpei
    2012 IEEE GLOBAL HIGH TECH CONGRESS ON ELECTRONICS (GHTCE), 2012,
  • [22] Steganographic Authentication in Cloud Storage for Mitigation of Security Risks
    Wazirali, Raniyah
    Chaczko, Zenon
    Chiang, Everlyn
    2017 25TH INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING (ICSENG), 2017, : 451 - 458
  • [23] Security Issues and Future Challenges of Cloud Service Authentication
    Lim, Shu Yun
    Kiah, M. L. Mat
    Ang, Tan Fong
    ACTA POLYTECHNICA HUNGARICA, 2017, 14 (02) : 69 - 89
  • [24] Security and IoT Cloud Federation: Design of Authentication Schemes
    Barreto, Luciano
    Celesti, Antonio
    Villari, Massimo
    Fazio, Maria
    Puliafito, Antonio
    INTERNET OF THINGS: IOT INFRASTRUCTURES, PT I, 2016, 169 : 337 - 346
  • [25] A Framework for Monitoring and Security Authentication in Cloud based on Eucalyptus
    Gao, Zefeng
    Li, Xiaoyong
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2015, : 349 - 353
  • [26] Security protocol analysis with improved authentication tests
    Li, Xiehua
    Yang, Shutang
    Li, Jianhua
    Zhu, Hongwen
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 123 - 133
  • [27] Multi Server Authentication System Based on Finger Print and Secured OTP using ECC
    Mythili, S.
    Nirmalrani, V
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 408 - 416
  • [28] A robust finger print based two-server authentication and key exchange system
    Mukesh, Rajeswari
    Damodaram, A.
    Bharathi, V. Subbiah
    2008 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEM SOFTWARE AND MIDDLEWARE AND WORKSHOPS, VOLS 1 AND 2, 2008, : 167 - +
  • [29] Finger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack
    Mukesh, Rajeswari
    Damodaram, A.
    Bharathi, V. Subbiah
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 14 - 20
  • [30] A hybrid privacy preserving scheme using finger print detection in cloud environment
    Verma G.
    Chakraborty R.
    Ingenierie des Systemes d'Information, 2019, 24 (03): : 343 - 351