Biometric Based Approach for Data Sharing in Public Cloud

نویسنده

  • Renu S
چکیده

The most important challenge faced by a public cloud is hacking or data intrusion. If an attacker hack the cloud they can manipulate the information or disable the services. We all know that a Biometric system can ensure that rendered services can only accessed by a registered user only. It can identify an authorized user by checking the physiological features of that person. Here I wish to propose a new approach based on biometric encryption for to improve the security of data sharing in public cloud. In this approach we combine the digital key with the biometric image to create bioscrypt. These digital keys can be used as the cryptographic key. During the verification the biometric image is combining with bioscrypt to retrieve the key for the encryption and decryption of the data. The cipher text is then uploading to the public cloud. And an authorized user can retrieve data by his digital key. This approach ensures the data integrity and confidentiality.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

Multi-model Bio-cryptographic Authentication in Cloud Storage Sharing for Higher Security

To achieve data storage security in cloud, bio cryptography techniques can be used. This study presents Personal identification using fingerprint and Iris biometric technology. Usually unimodal biometric techniques are used. Cloud computing provides many resources, very convenient charged service and minimum cost computing. This leads the cloud computing to become the most dominant computing in...

متن کامل

Towards Biometric-based Authentication for Cloud Computing

Cloud computing is an emerging technology that allows different service providers to offer services in an on-demand environment. Due to the advantages such as flexibility, mobility, and costs saving, the number of cloud user has increased tremendously. Consequently, a more secure and privacy preserving authentication system is becoming important to ensure that only the data owner or the authori...

متن کامل

Presenting a Morphological Based Approach for Filtering The Point Cloud to Extract the Digital Terrain Model

The Digital terrain model is an important geospatial product used as the basis of many practical projects related to geospatial information. Nowadays, a dense point cloud can be generated using the LiDAR data. Actually, the acquired point cloud of the LiDAR, presents a digital surface model that contains ground and non-ground objects. The purpose of this paper is to present a new approach of ex...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015