Biometrics-Based Un-Locker to Enhance Cloud Security Systems

被引:4
作者
Narang, Ashima [1 ]
Gupta, Deepali [2 ]
Kaur, Amandeep [1 ]
机构
[1] Maharishi Markandeshwar Univ, Sadopur Ambala, Haryana, India
[2] Chitkara Univ, Inst Engn & Technol, Rajpura, India
关键词
Authentication; Biometrics; Cloud Security; Cost; Encryption; Fingerprint; Malicious Users; SERVICE DELIVERY MODELS; ISSUES;
D O I
10.4018/IJCAC.2020100101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the increasing demand for cloud computing, its challenges are also increasing, and security is one of the preeminent concerns. A number of approaches were introduced earlier to secure cloud storage systems, but many of them failed to provide security effectively and even emanate the concern of cost. Efficiency and cost are the essential features for any cloud system and demand for a security mechanism. To accomplish this objective, a novel feature is introduced with a concept of biometric authentication and named as 'biometric-based un-locker'. Biometrics entities are unique in nature, so it will be the best and most cost-effective solution for the cloud. The performance of this proposed system is analyzed by generating a cloud environment and implementing it using the .NET framework on five different datasets. The results are calculated with both attackers and normal users, and performance is analyzed on the basis of time, size of data after encryption, and authentication rate. Results show that the proposed system effectively provides security and is also very cost-efficient.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 24 条
[1]  
Ahmad Ishrat, 2019, International Journal of Computing and Digital Systems, V8, P19, DOI 10.12785/ijcds/080103
[2]  
[Anonymous], 2018, SSRN ELECT J
[3]  
[Anonymous], 2016, INT J SCI RES, V5, P7
[4]  
[Anonymous], 2015, INT J SCI RES, V4, P924
[5]   Cloud Computing Security: Opportunities and Pitfalls [J].
Arshad, Junaid ;
Townend, Paul ;
Xu, Jie ;
Jie, Wei .
INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2012, 4 (01) :52-66
[6]  
Claycomb W. R., 2012, 2012 IEEE 36 ANN C S
[7]  
Gunasekhar T., 2019, DETECTION MITIGATION, P1, DOI [10.4018/978-1-5225-7924-3.H001, DOI 10.4018/978-1-5225-7924-3.H001]
[8]  
Hajra S, 2014, LECT NOTES COMPUT SC, V8469, P420
[9]   Service delivery models of cloud computing: security issues and open challenges [J].
Iqbal, Salman ;
Kiah, Miss Laiha Mat ;
Anuar, Nor Badrul ;
Daghighi, Babak ;
Wahab, Ainuddin Wahid Abdul ;
Khan, Suleman .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) :4726-4750
[10]  
Jaatun M. G., 2009, LOUD COMPUTING