A Proposed Biometric Authentication Model to Improve Cloud Systems Security

被引:1
|
作者
El-El-Sofany, Hosam [1 ,2 ]
机构
[1] King Khalid Univ, Abha, Saudi Arabia
[2] Cairo Higher Inst Engn Comp Sci & Management, Cairo, Egypt
来源
关键词
Cloud computing; cloud security; biometrics technologies; biometric; authentication;
D O I
10.32604/csse.2022.024302
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users' information. The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy, sensitivity, and specificity. The research study introduces a novel algorithm called "Bio_Authen_as_a_Service" for implementing and evaluating the proposed model. The proposed system performs the biometric authentication process securely and preserves the privacy of user information. The experimental result was highly promising for securing cloud services using the proposed model. The experiments showed encouraging results with a performance average of 93.94%, an accuracy average of 96.15%, a sensitivity average of 87.69%, and a specificity average of 97.99%.
引用
收藏
页码:573 / 589
页数:17
相关论文
共 50 条
  • [21] Biometric Authentication Systems
    Costin, Liliana Maria
    COMPLEXITY IN ARTIFICIAL AND NATURAL SYSTEMS, PROCEEDINGS, 2008, : 166 - 174
  • [22] BASE: a proposed secure biometric authentication system
    Crossingham, Colby G.
    von Solms, Sebastian H.
    POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 91 - 102
  • [23] Can Cancelable Biometrics Contribute to the Security Improvement of Biometric Authentication Systems?
    Shin, Sanggyu
    Seto, Yoichi
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT II, 2015, 9156 : 223 - 232
  • [24] Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems
    Nunes, Ivan De Oliveira
    Rindal, Peter
    Shirvanian, Maliheh
    COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 290 - 312
  • [25] Wolf attack probability: A new security measure in biometric authentication systems
    Une, Masashi
    Otsuka, Akira
    Imai, Hideki
    ADVANCES IN BIOMETRICS, PROCEEDINGS, 2007, 4642 : 396 - +
  • [26] Wolf attack probability: A theoretical security measure in biometric authentication systems
    Une, Masashi
    Otsuka, Akira
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1380 - 1389
  • [27] Security evaluation of biometric authentication systems under real spoofing attacks
    Biggio, B.
    Akhtar, Z.
    Fumera, G.
    Marcialis, G. L.
    Roli, F.
    IET BIOMETRICS, 2012, 1 (01) : 11 - 24
  • [28] BioTAM: a technology acceptance model for biometric authentication systems
    Kanak, Alper
    Sogukpinar, Ibrahim
    IET BIOMETRICS, 2017, 6 (06) : 457 - 467
  • [29] Data Security and Authentication in Hybrid Cloud Computing Model
    Wang, Jingxin K.
    Jia, Xinpei
    2012 IEEE GLOBAL HIGH TECH CONGRESS ON ELECTRONICS (GHTCE), 2012,
  • [30] Biometric authentication utilizing fuzzy extractor with PSO based security ensuring the data security mechanism as Trio in Cloud
    Sathish, A.
    Bajulunisha, A.
    Sridevi, R.
    Vatchala, S.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (06) : 4805 - 4819