A Secure Biometric Based Approach for Providing Security Services in Resource-aware Distributed Computing Environment

نویسنده

  • G. ATHISHA
چکیده

In recent years there is a need for a security infrastructure for our ubiquitous digital life without using Public key infrastructure and shared session key cryptography algorithms. Since the system scales up, the peer to peer approach is attractive to Distributed Computing Environment due to increase in large amount of resources. The resources in such environment possess different characteristics. The need for security services for such resource restricted environment is a challenging issue. Hence, in this paper a novel algorithm is proposed that uses the macro feature of the fingerprint biometric of the sender and the receiver to generate key(s). The proposed technique provides different security services like Authentication, Non repudiation and Confidentiality. In this work a novel key generation algorithm is proposed to generate unique set of keys by using both sender and receiver’s fingerprint biometrics. These keys are shared between the sender and the receiver by using the underlying concrete S-MIME protocol. Several samples are collected and the macro features are extracted using Finger print feature extraction algorithm. Out of ‘n’ ridges, a ridge is selected and plotted on the x-y axis. Plotting is done as per the sender’s choice. A set of points are selected and the key is generated. The proposed algorithm is implemented in C# DotNet and MATLAB and the results are tested and verified by taking a set of samples. The results of the proposed algorithm are compared with the existing PKI based algorithm with respect to the encryption time, decryption time and memory required.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014