Abstract
Cloud computing is one of the emerging technologies that transfers network users to the next level. Security is one of the critical challenges faced by cloud computing. Biometrics proves its efficiency to achieve secured authentication. A new attribute should be created to handle authentication information in the infrastructure. The proposed system model presented a new idea for biometric security system based on fingerprint recognition. It automated the verification method to match between two human fingerprints, where fingerprints are considered a commonly used biometrics to identify an individual and to verify their identity. The proposed system presented a new model of a security system, where the users were asked to provide multiple [two] biometric fingerprints during the registration for a service. These templates are stored at the cloud providers’ end. The users are authenticated based on these fingerprint templates which have to be provided in the order of random numbers that are generated every time. Both fingerprint templates and images were provided whenever encrypted for enhanced security. The proposed multi-fingerprint system achieved superior accuracy of 98 % compared to the single-fingerprint and manual-based attendance management systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kuo AM-H (2011) Opportunities and challenges of cloud computing to improve health care services. J Med Internet Res
Peelukhana R, Bala PS, Aghila G (2011) Securing virtual images using blind authentication protocol. Int J Eng Sci Technol (IJEST)
Nandi S, Roy S, Dansana J, Karaa WBA, Ray R, Chowdhury SR, Chakraborty S, Dey N (2014). Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int J Comput Netw Inf Secur 6(11)
Biswas S, Roy AB, Ghosh K, Dey N (2012) A Biometric authentication based secured atm banking system. Int J Adv Res Comput Sci Softw Eng
Dey M, Dey N, Mahata SK, Chakraborty S, Acharjee S, Das A (2014) Electrocardiogram feature based inter-human biometric authentication system. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC), pp 300–304
Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardiogram features insignificantly devalorized as an effect of watermarking for a multi-modal biometric authentication system, published by Advances in Biometrics for Secure Human Authentication and Recognition, CRC Press, ISBN-9781466582422, pp. 450
Bose S, Chowdhury SR, Sen C, Chakraborty S, Redha T, Dey N (2014) Multi-thread video watermarking: a biomedical application. In: International conference on circuits, communication, control and computing (I4C), pp 242–246
Dey N, Pal M, Das A (2012) A session based watermarking technique within the NROI of retinal fundus images for authencation using DWT, spread spectrum and Harris corner detection. Int J Mod Eng Res 2:749–757
Field W, Hellman ME (1976) New directions in cryptography by MEMBER. IEEE Trans Inf Theory 22:6
Davide M, Dario M, Jain AK, Salil P (2005) Handbook of fingerprint recognition, 2nd edn. Springer, New York
Sasirekha K, Mary CI (2012) Biometric based network video security system with RSA implementation. Int J Biom Bioinform
Tiwari P, Saklani A (2013) Role of biometric cryptogra phy in cloud computing. Int J Comput Appl 70–79
Sabri HM, Ghany KKA, Hefny HA, Elkhameesy N (2014) Biometrics template security on cloud computing. In: 2014 International conference on advances in computing, communications and informatics (ICACCI), pp 672–676
Liang B, Wu Z, You L (2014) A novel fingerprint- based biometric encryption. In: 2014 ninth international conference on P2P, Parallel, Grid, Cloud and internet computing (3PGCIC), pp 146–150
Omar MN, Salleh M, Bakhtiari M (2014) Biometric encryption to enhance confidentiality in Cloud computing. In: 2014 International symposium on biometrics and security technologies (ISBAST), pp 45–50
Masala GL, Ruiu P, Brunetti A, Terzo O, Grosso E (2015) Biometric authentication and data security in cloud computing. In: Proceedings of the international conference on security and management (SAM) (p 9). The steering committee of the world congress in computer science, computer engineering and applied computing (WorldComp)
Khan MK, Zhang J (2008) Multimodal face and finger print biometrics authentication on space-limited tokens. Neuro Comput 71(13):3026–3031
Emersic Z, Bule J, Zganec-Gros J, Struc V, Peer P (2014) A case study on multi-modal biometrics in the cloud/Multi-modal. ElektrotehniskiVestnik 81(3):74
Goh TA, Ngo D (2006) Random multispace quantization as an analytic mechanism for bio hashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 1892–1901
Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Trans Inf Forensics Secur 03–117
Kanade S, Petrovska-Delacretaz D, Zi BD (2009) Cancelable iris biometrics and using error correcting. IEEE Conference computer vision and pattern recognition. CVPR 2009, Miami, pp 120–127
Gudavalli M, Raju VS, Adari R (2012) A novel approach for multi biometric template protection. IEEE international conference on computing and security (ICCS’12), Ulaanbaatar, Mongolia
Singh K, Verma R, Chehal R (2012) Modified prime number factorization algorithm (MPFA) for RSA public key encryption. Int J Soft Comput and Eng (IJSCE) 4(2):204–206
Miller VS (1986) Use of elliptic curves in cryptography. Adv Cryptol CRYPTO 85:417–426
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 203–209
IEEE-P1363–2000 (2000) IEEE standard specifications for public-key cryptography. IEEE Computer Society Press, Silver Spring, MD, USA
ISO/IEC15946 (2002) Information technology -security techniques: cryptographic techniques based on elliptic curves. International Organization for Standardization, Switzer land
NSIX9.62 (1999) Public key cryptography for the financial services industry: the elliptic curve digital signature algorithm (ECDSA). American National Standards Institute, New York, USA
NIST. FIPS 186–2 (2000) Digital signature standard (DSS). National Institute for Standards and Technology, Gaithersburg
Bos JW, Halderman JA, Heninger N, Moore J, Naehrig M, Wustrow E (2014) Elliptic curve cryptography in practice. In: Financial cryptography and data security. Springer, Berlin, pp 157–175
Lenstra AK, Verheul ER (2001) Selecting cryptographic key sizes. J Cryptol 14(4):1–255
Michaelis K, Meyer C, Schwenk J (2013) Randomly failed The state of randomness in current Java implementations. In Dawson E (ed) CT-RSA, 7779:129–144 of LNCS, Springer
Miers I, Garman C, Green M, Zerocoin RAD (2013) Anonymous distributed E-Cash from Bitcoin. In: IEEE symposium on security and privacy, pp 397–411
Miller VS (1986) Use of elliptic curves in cryptography. In: Williams HC (ed) CRYPTO, volume 218 of LNCS, Springer, pp 417–426
Juels A, Weis SA (2005) Authenticating pervasive devices with human protocols. In: Advances in cryptology–CRYPTO 2005. Springer, Heidelberg, pp 293–308
Singh K, Verma R, Chehal R (2012) Modified prime number factorization algorithm (MPFA) for RSA public key encryption. Int J Soft Comput Eng(IJSCE) 2:204–206
Sharma S, Yadav JS, Sharma P (2012) Modified RSA public key cryptosystem using short range natural number algorithm. Int J Adv Res Comput Sci Softw Eng 2:134–138
Wiener M (1990) Cryptanalysis of short RSA secret expo Nents. IEEE Trans Inf Theory 36:553–558
Latha U, Rameshkumar K (2013) A study on attacks and security against fingerprint template database 2(5)
Jain AK, Uludag U (2004) Attacks on biometric systems: a case study in fingerprints. In: Proceedings of SPIE-EI 2004, security, seganography and watermarking of multimedia contents VI, San Jose, CA, pp 622–633
Jain AK, Ross A, Uludag U (2005) Biometric template security: challenges and solutions. In: Proceedings of the European signal processing conference (EUSIPCO ‘05), Antalya, Turkey
Moore A, Ellison RJ, Linger R, (2001) Attack modeling for information security and survivability, technical report, Carnegie Mellon University
Abdullayeva F, Imamverdiyev Y, Musayev V, Man WJ (2008) Analysis of security vulnerabilities in biometric systems. In: The second international conference: problems of cybernetics and informatics
Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92:948–960
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rajeswari, P., Viswanadha Raju, S., Ashour, A.S., Dey, N. (2017). Multi-fingerprint Unimodel-based Biometric Authentication Supporting Cloud Computing. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-44790-2_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44789-6
Online ISBN: 978-3-319-44790-2
eBook Packages: EngineeringEngineering (R0)