Abstract
Cloud computing models have emerged to be a key player in the field of information processing in the recent decade. Almost all the services related to data processing and storage from firms work on a cloud platform providing the requested services to the consumers at any point of time and location. Security is an essential concern in cloud models as they primarily deal with data. Since multitude of user's access cloud by way of storing confidential information in the virtual storage platform or accessing vital data from archives, security and privacy is of prime concern. This has been taken as the motivation of this research work. An effective Chaotic based Biometric authentication scheme for user interaction layer of cloud is proposed and implemented in this research paper. The proposed method uses fingerprint as the biometric trait and varies from conventional methods by utilizing a N-stage Arnold Transform to securely verify the claim of the so-called legitimate user. The experimentations have been compared with existing benchmark methods and superior performances observed in terms of detections, false detection accuracy etc.
References
Hemalatha, S. (2020). A systematic review on Fingerprint based Biometric Authentication System. 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), Vellore, India, 2020, pp. 1-4, doi: 10.1109/ic-ETITE47903.2020.342.
Zhang Rui and Zheng Yan, (2019). A survey on biometric authentication: Toward secure and privacy preserving identification. IEEE access. 7: 5994 – 6009.
Prasad, S. M., Govindan, V. K. and Sathidevi, P. S. (2011). Palmprint authentication using fusion of wavelet and contourlet features. Secured Communication Networks. 4(5): 577-590.
Kathiresan, N. and Samuel Manoharan J. (2015). A comparative analysis of fusion techniques based on multi resolution transforms. National Academy Science Letters. 38: 61 – 65.
Galka, J., Masior, M. and Salasa, M. (2014). Voice authentication embedded solution for secured access control. IEEE transactions on consumer electronics. 60(4): 653 – 661.
Kanchana (2018). Fingerprint based biometric authentication in IoT for resolving security challenges. International Journal of Research and Analytical Reviews. 5(4): 1000 – 1003.
Ferrag, M. A., Maglaras, L., Derhab, A. (2019). Authentication and Authorization fr Mobile IoT devices using features: Recent Advances and Future Trends. Security and Communication Networks. 2019. https://doi.org/10.1155/2019/5452870.
Fan, K., Tian, Q., Wang, J., Li, H. and Yang, Y. (2017). Privacy protection-based access control scheme in cloud-based services. China Communications. 14(1): 61-71.
Padma, P. and Srinivasan, S. (2016). A survey on biometric based authentication in cloud computing. 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2016, pp. 1-5, doi: 10.1109/INVENTIVE.2016.7823273.
Chang H., Choi E. (2011) User Authentication in Cloud Computing. In: Kim T., Adeli H., Robles R.J., Balitanas M. (eds) Ubiquitous Computing and Multimedia Applications. UCMA 2011. Communications in Computer and Information Science, vol 151. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20998-7_42.
Rakhshanda Batool, Ghazal Naveed and Abdulhaq Khan. (2015). Biometric Authentication in Cloud Computing. International Journal of Computer Applications. 129 (11):6-9.
Yassin, A. A., Jin, H., Ibrahim, A., Qiang, W. and Zou, D. (2012). Efficient password-based two factors authentication in cloud computing. International Journal of Security and its Applications. 6(2): 143–148.
Selvwal, A., Gupta, S. K. and Surender. (2017). Low overhead Indexed Template Security Scheme for Multimodal biometrics. Journal of Intelligent and Fuzzy System. 32: 3325 – 3337.
Kumar, T, Jangra, S. and Bhushan, S. (2017). Face Recognition with decision tree using SVM and SURF. International Journal of control theory and applications. 10(15): 173 – 180.
Jin, Z., Teoh A B J., Ong, T. S. and Tee, C. (2012). Fingerprint template protection with minutiae-based bit string for security and privacy preserving. Expert System Applications. 39(6): 6157 – 6167.
Chiu, P – L., Lee, K- H. (2019). Efficient constructions for progressive visual cryptography with meaningful shares. Signal Processing. 165:233 – 249.
