An Indirect Fingerprint Authentication Scheme in Cloud Computing

Article Preview

Abstract:

The cloud computing offers dynamically scalable online resources provisioned as a service over the Internet cheaply. However, the security challenges it poses are equally striking. The reliable user authentication techniques are required to combat the rising security threat in cloud communications. Due to the non-denial requirements of remote user authentication scheme, it is most commonly achieved using some form of biometrics-based method. Fingerprint authentication is one of the popular and effective approaches to allow the only authorized users to access the cryptographic keys. While the critical issue in remote biometric cryptosystem is to protect the template of a user stored in a database. The biometric template is not secure and the stolen templates cannot be revoked, which is easy to leak user identity information. To overcome these shortcomings, in this paper, an indirect fingerprint authentication scheme is proposed. Further, we apply this secure scheme to the cloud system combing with PKI mechanism. At last, a comprehensive and detailed security analysis of the proposed scheme in cloud computing is provided.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

986-990

Citation:

Online since:

January 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Bernd Grobauer, Tobias Walloschek and Elmar Stocker, Understanding Cloud-Computing Vulnerabilities, IEEE Security and Privacy, vol. 99, (2010).

DOI: 10.1109/msp.2010.115

Google Scholar

[2] J. Heiser and M. Nicolett, Assessing the security risks of cloud computing, " Gartner Report, 2009. [Online]. Available: http: /www. gartner. com/DisplayDocument, id=685308.

Google Scholar

[3] S. Dutta, A. Kar, N. C. Mahanti, and B. N. Chatterji, Network security using biometric and cryptography, in Proc. Adv. Concepts Intell. Vis. Syst. LNCS 5259.

Google Scholar

[4] Kim H. S and Yoo K. Y, ID-based Password Authentication Scheme Using Smart Card and Fingerprints, ACM SIGOPS Operating System Review, vol. 37, no. 2, pp.32-41, ISSN 0613-5980.

DOI: 10.1145/958965.958969

Google Scholar

[5] Fan C. I, Lin Y. H. and Hus R. H. Remote Password Authentication Scheme with Smart Cards and Biometics, Processings of the 49th annual IEEE Global Telecommunications Conference, pp.1-5, San Fracisco, California, USA, 27 NOV, (2006).

Google Scholar

[6] A. Juels and M. Sudan, A fuzzy vault scheme, in Proc. IEEE Int. Symp. Inform. Theroy, Lausanne, Switzerland, 2002, p.408.

Google Scholar