International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us

IJSTR >> Volume 5 - Issue 4, April 2016 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

A Survey On Biometric Security Technologies From Cloud Computing Perspective

[Full Text]



Shivashish Ratnam, Mimzee Gupta, Dr. Ajay S. Singh, Thirunavukkarasu K



cloud computing; biometrics; services; technology; Fingerprint; Voice Recognition; Physical biometrics;



Cloud computing is one of the rising technologies, that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods, such as passwords and IDs, are well known and hence, biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud provider’s section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.



[1] http://en.wikipedia.org/wiki/Biometrics

[2] http://www.fi.muni.cz/reports/files/older/FIMU-RS-2000-08.pdf.

[3] http://www.indexbiometrics.com/physiological_or_behavioral.htm

[4] http://ntrg.cs.tcd.ie. http://www.sans.org/reading_room/whitepapers/authentication/biometric-scanning-technologies-finger-facial- retinal-scanning.

[5] P.Tuylus, E.Verbitskiy, J.Goseling and D.Denteneer, Privacy Protecting Biometric Authentication Systems, An Overview, EUSIPCO 2004: XII European Signal Processing Conference.

[6] Tongue as a Biometric Visualizes New Prospects of Cloud Computing Security – Sowmya, Suryavara, ShuchitaKapoor, ShwetaDhatterwal, RohailaNaaz and Anand Sharma, Modi Institute of Technology and Science, Lakshmangarh, Rajasthan, India- 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) IACSIT Press, Singapore.

[7] N.K.Ratha, J.H.Connell and R.Bolle, Enhancing Security and Privacy of Biometric Based Authentication Systems. IBM Systems Journal, 40(3);614-634 2001.

[8] NIST Special Publication 800-145 “The NIST Definition of CloudComputing” Peter Mell Timothy Grance http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.

[9] http://www.netsecurity.org/secworld.php?id=8922

[10] AnupamTiwari, “CLOUD FORENSICS: CHALLENGES ONLY AHEAD”, Cyber Times International Journal of Technology & Management, Vol. 8 Issue 1, October – March 2015.

[11] Kemal A. Delic, Jeff A. Riley, Enterprise Knowledge Clouds: Next Generation KM Systems?, International Conference on Information, Process, and Knowledge Management, 2009.

[12] "Towards Continuous Cloud Service Assurance for Critical Infrastructure IT". The 2nd International Conference on Future Internet of Things and Cloud (IEEE FiCloud-2014). Retrieved 2014-08-15.

[13] AlbenaAntonova, RoumenNikolov, Conceptual KMS Architecture within Enterprise 2.0 and Cloud Computing, Computing, 2005.

[14] http://ntrg.cs.tcd.ie

[15] Blind Authentication: A secure crypto-Biometric Verification protocol.

[16] http://en.wikipedia.org/wiki/Single_sign-on

[17] NIST Special Publication 800-145 “The NIST Definition Cloud Computing “