Skip to main content

User Authentication Method Design Based on Biometrics in a Multi-cloud Environment

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 373))

Abstract

Users in a multi-cloud environment use two or more cloud services and each cloud has an authentication module and user management module. However, in order to use a variety of cloud, users must perform a user authentication for each cloud. At such time, as the user authentication information is stored in various clouds, there are problems of being captured or stolen. In this paper, a user authentication method based on biometrics using biometric information is proposed in order to provide a safe user authentication in a multi-cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chow, R., et al.: Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop. ACM (2010)

    Google Scholar 

  2. Lee, S., Ong, I., Lim, H., Lee, H.: Two Factor Authentication for Cloud Computing. International Journal of KIMICS 8(4), August 2010

    Google Scholar 

  3. Graser, T., et al.: Single Sign On. U.S. Patent Application 12/094,858

    Google Scholar 

  4. Chang, H., Choi, E.: User authentication in cloud computing. In: Ubiquitous Computing and Multimedia Applications, pp. 338–342. Springer Berlin, Heidelberg (2011)

    Google Scholar 

  5. Ahn, H., et al.: User authentication platform using provisioning in cloud computing environment. In: Advanced Communication and Networking, pp. 132–138. Springer Berlin, Heidelberg (2011)

    Google Scholar 

  6. Choudhury, A.J., et al.: A strong user authentication framework for cloud computing. In: 2011 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE (2011)

    Google Scholar 

  7. Chen, N., Rui, J.: Analysis and improvement of user authentication framework for cloud computing. In: Advanced Materials Research, vol. 756 (2013)

    Google Scholar 

  8. FIDO: Fast Identity Online Alliance Privacy Principles. The FIDO Alliance : Privacy Principles Whitepaper FIDO Alliance, February 2014

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Moon-seog Jun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Song, S., Lee, J., Lee, J., Jun, Ms. (2015). User Authentication Method Design Based on Biometrics in a Multi-cloud Environment. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0281-6_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0280-9

  • Online ISBN: 978-981-10-0281-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics