The Fingerprint Identification Technology is Applied to the Application Research of Web Cloud Storage Safety Certification

Article Preview

Abstract:

In view of the authentication model based on token and password of traditional web cloud storage easily is forgotten or theft that raise questions about identity theft. This paper proposes a identity authentication scheme of web cloud storage based on fingerprint identification. Using the identity authentication model of fingerprint identification to verify web cloud storage users that satisfy people to the web of cloud storage security, reliability and convenience of the proposed requirements, effectively solve the problem of the resource of unauthorized access. The paper put forward three layers of c/s architecture that effectively improve the flexibility, scalability and efficiency of authentication system. And mixed encryption algorithm is put forward as two-way authentication identity authentication protocol improve system security and realize high transmission of huge amounts of data. Finally through the test and analysis of practical application proves that the security authentication based on fingerprint identification applying in the web cloud storage certification system is feasible.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

161-167

Citation:

Online since:

April 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chao Zhang. Cloud computing and cloud storage management techniques [J]. Shanghai electric power college journal: 2009: 1-2.

Google Scholar

[2] Qiuxin Ren. Some key algorithm research about automatic fingerprint identification [M]. Central south university master's thesis: 2007: 15-26.

Google Scholar

[3] R. Cappelli, D. Maio, D. Maltoni. Fingerprint Classification Based on Multi-Space KL[J]. In: Proc. Of the Workshop on Automatic Identification Advances Technologies, Summit NJ, (1999).

Google Scholar

[4] B. Bhanu, X. Tan. Fingerprint Indexing Based on Novel Features of Minutiae Triplets [J]. IEEE Tram. Pattern Analysis Machine Intelligence, 2004, 25 (5): 616-622.

DOI: 10.1109/tpami.2003.1195995

Google Scholar

[5] Hualong Xu. The research and implementation of two-way authentication system of combinating a dynamic password with fingerprint recognition. [D]. Lanzhou University, (2009).

Google Scholar

[6] Jinhai Zhang, Xinjian Liu, Bo Chen. The design and implementation of ID Authentication System based on Fingerprint Identification[M]. Fourth International Conference on Intelligent Computation Technology and Automation: 2011: 1-4.

DOI: 10.1109/icicta.2011.585

Google Scholar

[7] Wei Liu, Cong Zhou, Zhiwei Ye. Fingerprint Based Identity Authentication for Online Examination System[M]. Second International Workshop on Education Technology and Computer Science. 2010(2): 308.

DOI: 10.1109/etcs.2010.409

Google Scholar

[8] Xiong Zhong. The application of e-commerce security certification based on fingerprint identification technology. [D]. South of China science and engineering university. (2011).

Google Scholar