Medical Systems Data Security and Biometric Authentication in Public Cloud Servers

被引:0
作者
Santos, Nelson [1 ]
Ghita, Bogdan [2 ]
Masala, Giovanni Luca [3 ]
机构
[1] Univ Plymouth, Sch Engn, Comp & Math, Plymouth PL4 8AA, England
[2] Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth PL4 8AA, England
[3] Univ Kent, Sch Comp, Canterbury CT2 7NZ, England
关键词
Cloud computing; Biometrics (access control); Data security; Biomedical imaging; Encryption; Authentication; Security; Data fragmentation; cloud security; NoSQL database; security and protection; CHALLENGES; INTEGRITY; ISSUES;
D O I
10.1109/TETC.2023.3271957
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in distributed computing and virtualization allowed cloud computing to establish itself as a popular data management and storage option for organizations. However, unclear safeguards, practices, as well as the evolution of legislation around privacy and data protection, contribute to data security being one of the main concerns in adopting this paradigm. Another important aspect hindering the absolute success of cloud computing is the ability to ensure the digital identity of users and protect the virtual environment through logical access controls while avoiding the compromise of its authentication mechanism or storage medium. Therefore, this paper proposes a system that addresses data security wherein unauthorized access to data stored in a public cloud is prevented by applying a fragmentation technique and a NoSQL database. Moreover, a system for managing and authenticating users with multimodal biometrics is also suggested along with a mechanism to ensure the protection of biometric features. When compared with encryption, the proposed fragmentation method indicates better latency performance, highlighting its strong potential use-case in environments with lower latency requirements such as the healthcare IT infrastructure.
引用
收藏
页码:572 / 582
页数:11
相关论文
共 46 条
[1]  
Aldossary S, 2016, INT J ADV COMPUT SC, V7, P485
[2]  
Arora A, 2017, PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), P288, DOI 10.1109/CONFLUENCE.2017.7943164
[3]   Advantages and challenges of adopting cloud computing from an enterprise perspective [J].
Avram , Maricela-Georgiana .
7TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING (INTER-ENG 2013), 2014, 12 :529-534
[4]   A Light-Weight Permutation based Method for Data Privacy in Mobile Cloud Computing [J].
Bahrami, Mehdi ;
Singhal, Mukesh .
2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, :189-196
[5]   Anonymizing mobility data using semantic cloaking [J].
Barak, Omer ;
Cohen, Gabriella ;
Toch, Eran .
PERVASIVE AND MOBILE COMPUTING, 2016, 28 :102-112
[6]   Multimodal Biometric Authentication using PSO based Watermarking [J].
Bedi, Punam ;
Bansal, Roli ;
Sehgal, Priti .
2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 :612-618
[7]   Enterprise Cloud: its Growth & Security Challenges in China [J].
Chandel, Sonali ;
Ni, Tian-Yi ;
Yang, Geng .
2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018), 2018, :144-152
[8]  
Choudhary Swati K., 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). Proceedings, P1062, DOI 10.1109/ICOEI.2019.8862563
[9]  
Dahiya N., 2017, International Journal of Advanced Research in Computer Science, V8, P146, DOI DOI 10.26483/IJARCS.V8I8.4636
[10]   An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks [J].
Dev, Himel ;
Sen, Tanmoy ;
Basak, Madhusudan ;
Ali, Mohammed Eunus .
2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC), 2012, :1106-1115