Fingerprint Code Authentication Protocol on Cloud

被引:0
作者
Khodabacchus, Muhammad Yaasir [1 ]
Soyjaudah, Krishnaraj Madhavjee Sunjiv [1 ]
Ramsawok, Gianeswar [1 ]
机构
[1] Univ Mauritius, Fac Engn, Reduit, Mauritius
来源
2016 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND INNOVATIVE BUSINESS PRACTICES FOR THE TRANSFORMATION OF SOCIETIES (EMERGITECH) | 2016年
关键词
biometrics; security; privacy; cancelable;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is introducing several immense changes to people's life style and dealing pattern recently for its innumerous advantages. However, potential security issues are often the barrier for its widespread applications. Modern biometric technologies such as fingerprints claim to produce a different answer to cloud security. Even though there are areas which biometrics method provides benefits, it is at risk of attacks. Towards addressing these problems and rising public confidence, a novel protocol for biometrics authentication on stolen token based on cancelable is presented.
引用
收藏
页码:162 / 166
页数:5
相关论文
共 15 条
  • [1] [Anonymous], 2011, 247452011 ISOIEC
  • [2] Ashok J., 2010, International Journal on Computer Science and Engineering, V2, P2402
  • [3] Khandelwal Sarika, 2015, EM ICT BRIDG FUT P 4, V337, P311
  • [4] Lawand Suhas, 2010, IEEE T INF FOREN SEC, V5, P255
  • [5] A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion
    Li, Cai
    Hu, Jiankun
    Pieprzyk, Josef
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1193 - 1206
  • [6] Maji Arnab Kumar, 2015, ADV INTELLIGENT SYST, V2, P109
  • [7] Ponemon Institute LLC, 2015, YEAR MEG BREACH, P5
  • [8] PwC LLP, 2016, KEY FIND GLOB STAT I, P18
  • [9] Ratha NK, 2001, LECT NOTES COMPUT SC, V2091, P223
  • [10] Rathgeb A, 2011, EURASIP J INFORM SEC, V1, P11