CFP last date
20 May 2024
Reseach Article

Role of Biometric Cryptography in Cloud Computing

by Praveen Tiwari, Ashis Saklani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 9
Year of Publication: 2013
Authors: Praveen Tiwari, Ashis Saklani
10.5120/11993-7874

Praveen Tiwari, Ashis Saklani . Role of Biometric Cryptography in Cloud Computing. International Journal of Computer Applications. 70, 9 ( May 2013), 34-38. DOI=10.5120/11993-7874

@article{ 10.5120/11993-7874,
author = { Praveen Tiwari, Ashis Saklani },
title = { Role of Biometric Cryptography in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 9 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number9/11993-7874/ },
doi = { 10.5120/11993-7874 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:27.653111+05:30
%A Praveen Tiwari
%A Ashis Saklani
%T Role of Biometric Cryptography in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 9
%P 34-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing presents a distinct way to share distributed resources and services with the help of internet. Cloud computing includes sharing of distributed resources via internet- an open network, therefore security becomes an essential issue. A secure data transmission and key management is needed in cloud computing, to overcome such problems. Securing information is the key issue in the field of network security. Cryptography is one of the most effective way to enhance information security. Biometric cryptography is a technique which uses biometric features to encrypt the data and overcome the defects of traditional cryptography. In this paper, a biometric based encryption and decryption scheme, in which a master key is generated using whole/partial hash portion of combined sender and receiver finger print. From this master key many random keys are generated using pseudo random generator which is used as a secret key for both encryption and decryption. The pseudo random number generator may have different algorithm to generate one dimensional number from a piece of image matrix of biometry. This one dimensional number is considered as master key and remains valid for one session unless renewed. This master key and sequence number (seed value, other parameter) is sent by the sender after watermarking it in sender's fingerprint along with encrypted message. Proposed system has an advantage that no need to search public key database and security is maintained. The computational requirement and network security features are duly addressed in this paper to make a normal cloud computing platform to trusted cloud computing platform and assured a secure data transmission.

References
  1. Ke Xu et al : 2009, A cloud computing platform based on P2P,
  2. Wang Han-zhang et al : 2010, An improved trusted cloud computing platform model based on DAA and Privacy CA scheme,
  3. Shubhashis Sengupta etal :2011 Cloud Computing Security - Trends and Research Directions,
  4. Zhidong Shen et al:2010 The Security of Cloud Computing System enabled by Trusted Computing Technology,
  5. Wang Jun-jie et al: 2011 Security Issues and Countermeasures in Cloud Computing,
  6. John harauz et al: 2010 Data security in the world of cloud computing,
  7. Sameera Abdulrahman et al: 2009 Cloud computing security management,
  8. Xuan Zhang et al : 2010 Inforamtion security risk management framework for cloud computing environments,
  9. Mehnet Yeldiz et al: 2010 A layered security approach for cloud computing infrastructure,
  10. Clancy, T. C. , Kiyavash, N. , Lin, D. J. :2003 Secure smartcard-based ?ngerprint authentication. In: Proceedings ACM SIGMM 2003 Multimedia, Biometrics Methods and Workshop, pp. 45-52
  11. Soutar, C. , Roberge, D. , Stojanov, S. A. , Gilroy, R. , Vijaya Kumar, B. V. K. :1998 Biometric encryption using image processing. In: Proceedings of the SPIE - Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178-188
  12. Roginsky, A. :2004 A New Method for Generating RSA Keys. In: International Business Machines Consulting Group
  13. Davida, G. I. , Frankel, Y. , Matt, B. J. :1998 On enabling secure appli- cations through of?ine biometric identi?cation. In: Proceedings of the IEEE Privacy and Security, pp. 148-157
  14. Davida, G. I. , Matt, B. J. , Peralta, R. :1999 On the relation of error correction and cryptography to an of?ine biometric based identi?cation scheme. In: Proceedings Workshop Coding and Cryptography, pp. 129-138
  15. Monrose, F. , Reiter, M. K. , Li, Q. , Wetzel, S. : 2001 Cryptographic Key Generation from Voice. In: Proceedings IEEE Symposium on Security and Privacy
  16. Costanzo , C. R. : Active Biometric Cryptography: 2007 Key Generation Using Feature and Parametric Aggregation. In: Second International Conference on Internet Monitoring and Protection, ICIMP 2007, July 1-5, p. 28
  17. Poh, G. S. , Martin, K. M. : A Framework for Design and Analysis of Asymmetric Fingerprint Protocols. In:2007 Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, pp. 457-461
  18. Schenier, B. :1996 Applied Cryptography Protocol, Algorithms, and Source Code in C, 2nd edn. , p. 184. Wiley Computer Publishing/John Wiley and Sons, Chichester
  19. Dutta, Sandeep, Kar, Avijit, Mahanti, N. C. , Chatterji, B. N :2008 Network Security Using Biometric and Cryptography. In:J. Blanc-Talon et al. (Eds. ): ACIVS 2008, LNCS 5259, pp. 38-44, 2008. Copyright Springer-Verlag Berlin Heidelberg
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Security Biometric Cryptography