Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Multi-model Bio-cryptographic Authentication in Cloud Storage Sharing for Higher Security

P. Selvarani and P. Visu
Department of CSE, Vel Tech University, Avadi, Chennai-62, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology  2015  1:95-101
http://dx.doi.org/10.19026/rjaset.11.1680  |  © The Author(s) 2015
Received: March ‎7, ‎2015  |  Accepted: April ‎13, ‎2015  |  Published: September 05, 2015

Abstract

To achieve data storage security in cloud, bio cryptography techniques can be used. This study presents Personal identification using fingerprint and Iris biometric technology. Usually unimodal biometric techniques are used. Cloud computing provides many resources, very convenient charged service and minimum cost computing. This leads the cloud computing to become the most dominant computing in the recent years. Even though the cloud provide secured service, it also undergoes with some security problem especially form hackers. The existing unimodal bio cryptography techniques often have limitations such as consciousness to noise, intra class consistency, data aspect and other factors. This research study presents personal identification using fingerprint, iris and cryptographic technologies. Combined biometric technology will secure the data from unauthorized users. The purpose of this study is to study the combination of fingerprint and iris and also to include the cryptographic methods to achieve the higher accuracy and more security. The result of this study can overcome some of the limitations of using single biometric technology. The combination of Finger print and Iris form the key for Blowfish algorithm to store the secured data from unauthorized users in cloud environment.

Keywords:

Cloud security, fingerprint recognition, iris recognition, multimodal biometric,


References

  1. Bellare, M., S. Keelveedhi and T. Ristenpart, 2013. Message-locked encryption and secure deduplication. Proceeding of the International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT.
    CrossRef    
  2. Koteeswaran, S., J. Janet, E. Kannan and P. Visu, 2012. Terrorist intrusion monitoring system using outlier analysis based search knight algorithm. Eur. J. Sci. Res., 74(3): 440-449.
  3. Mane, V.M. and D.V. Jadhav, 2013. Review of multimodal biometrics: Applications, challenges and research areas. Int. J. Biometrics Bioinformat. 3(5): 90-95.
  4. Nandakumar, K., A.K. Jain and S. Pankanti, 2007. Fingerprint-based fuzzy vault: Implementation and performance. IEEE T. Inf. Foren. Sec., 2(4): 744-757.
    CrossRef    
  5. Patrascu, A. and V. Patriciu, 2013. Beyond digital forensics: A cloud computing perspective over incident response and reporting. Proceeding of the IEEE International Symposium on Applied Computational Intelligence and Informatics.
    CrossRef    
  6. Radha, N., S. Karthikeyan and P. Anupriya, 2010. Securing retina fuzzy vault system using soft biometrics. Global J. Comput. Sci. Technol., 10(7): 13-18.
  7. Sakshi, K. and L. Anil, 2014. Improving performance by combining fingerprint and iris in multimodal biometric. Int. J. Comput. Sci. Inf. Technol., 5(3): 4522-4525.
  8. Sanjekar, P.S. and J.B. Patil, 2013. An overview of multimodal biometrics. Signal Image Process. Int. J., 4(1): 57-64.
    CrossRef    
  9. Sasidhar, K., V.L. Kakulapati, K. Ramakrishna and K. KailasaRao, 2010. Multimodal biometric systems-study to improve accuracy and performance. Int. J. Comput. Sci. Eng. Surv., 1(2): 54-61.
    CrossRef    
  10. Sheeba, T. and M. Justin Bernard, 2012. Survey on multimodal biometric authentication combining fingerprint and finger vein. Int. J. Comput. Appl., 51(5): 55-60.
    CrossRef    
  11. Shweta, M. and K. Chander, 2013. A novel approach for securing biometric template. Int. J. Adv. Res. Comput. Sci. Softw. Eng., 3(5): 397-403.
  12. Sumeet, K., 2013. Enhancing template security by a biometric key generating cryptosysytem: A review. Int. J. Adv. Res. Comput. Sci. Softw. Eng., 3(8): 973-976.
  13. Velciu, M.A., A. Patrascu and V.V. Patriciu, 2014. Bio-cryptographic authentication in cloud storage sharing. Proceeding of the 9th IEEE International Symposium on Applied Computational Intelligence and Informatics, pp: 165-170.
    CrossRef    
  14. Visu, P., J. Janet, E. Kannan and S. Koteeswaran, 2012a. Optimal energy management in wireless adhoc network using Artificial Bee Colony based routing protocol. Eur. J. Sci. Res., 74(2): 301-307.
  15. Visu, P., S. Koteeswaran and J. Janet, 2012b. Artificial bee colony based energy aware and energy efficient routing protocol. J. Comput. Sci., 8(2): 227-231.
    CrossRef    
  16. Zawoad, S., A.K. Dutta and R. Hasan, 2013. SecLaaS: Secure logging-as a- service for cloud forensics. Proceeding of the ACM Symposium on Information, Computer and Communications Security.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved