Improving cloud data security through hybrid verification technique based on biometrics and encryption system

被引:10
作者
Hossain M.A. [1 ]
Al Hasan M.A. [2 ]
机构
[1] Department of Computer Science and Engineering, Prime University, Dhaka
[2] Bangladesh-Japan Information Technology, Dhaka
关键词
AES algorithm; biometrics; Cloud computing; cloud data security; cloud security; encryption; fingerprint; OTP; ROI;
D O I
10.1080/1206212X.2020.1809177
中图分类号
学科分类号
摘要
Cloud computing is a unique network or environment where access, maintenance and process can be done from any part of the world. It is a customized internet-based computer server. It is a current trend of modern technology. For the massive computational power, it is the best option for storing data. There is no uncertainty that Cloud Data Server offers quick and solid types of assistance to its customers. When data is storing in the cloud storage the most important thing comes is the security of data. So, in recent years, cloud security is so much important issue because of the increasing of data. For the security of cloud computing, in this research, a hybrid verification technique is made which is based on biometric and encryption systems. In order to achieve strong and secure technique, this work use fingerprint as biometric technique and advanced encryption standard as a trustworthy encryption system. The primary goal of this paper is to avert information access from cloud information stockpiling focuses by unapproved clients. This new data security system can provide efficient authentication of cloud computing. © 2020 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:455 / 464
页数:9
相关论文
共 27 条
[1]  
Md. Alamgir H., Jannatul F., Marjia K., A study and implementation of large-scale log-determinant computation to cloud, Int J Comput Appl, pp. 1-9, (2019)
[2]  
Xiaowei Y., Xiaosong Z., Ting C., The research and design of cloud computing security framework, Adv Comput Commun Control Autom, 121, pp. 757-763, (2011)
[3]  
Jamil D., Zaki H., Cloud computing security, Int J Eng Sci Technol, 3, pp. 3478-3483, (2011)
[4]  
Aamir N., Cloud computing: security issues and challenges, J Wirel Commun, 1, pp. 10-15, (2016)
[5]  
Adnaan A., Thariq H., Cloud computing: study of security issues and research challenges, Int J Adv Res Comput Eng Technol, 7, pp. 2278-1323, (2018)
[6]  
Subhashini P., Yeshwanth R., Securing cloud data using encryption algorithms, Int J Adv Res Sci Eng, 6, pp. 1188-1194, (2017)
[7]  
Rohit B., Sugata S., A survey on security issues in cloud computing and associated mitigation techniques, Int J Comput Appl, 47, pp. 47-66, (2012)
[8]  
Geetanjali C., Jainul A., Modified secure two way authentication system in cloud computing using encrypted one time password, Int J Comput Sci Inform Technol, 5, pp. 4077-4080, (2014)
[9]  
Shweta M., Chander V., A hybrid approach for securing biometric template, Int J Eng Adv Technol, 2, pp. 2249-8958, (2013)
[10]  
Arun R., Anil J., James R., A hybrid fingerprint matcher, Pattern Recognit., 3, pp. 795-798, (2002)