CFP last date
20 January 2025
Reseach Article

Biometric Authentication in Cloud Computing

by Rakhshanda Batool, Ghazal Naveed, Abdulhaq Khan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 11
Year of Publication: 2015
Authors: Rakhshanda Batool, Ghazal Naveed, Abdulhaq Khan
10.5120/ijca2015906497

Rakhshanda Batool, Ghazal Naveed, Abdulhaq Khan . Biometric Authentication in Cloud Computing. International Journal of Computer Applications. 129, 11 ( November 2015), 6-9. DOI=10.5120/ijca2015906497

@article{ 10.5120/ijca2015906497,
author = { Rakhshanda Batool, Ghazal Naveed, Abdulhaq Khan },
title = { Biometric Authentication in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 11 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number11/23115-2015906497/ },
doi = { 10.5120/ijca2015906497 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:07.017281+05:30
%A Rakhshanda Batool
%A Ghazal Naveed
%A Abdulhaq Khan
%T Biometric Authentication in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 11
%P 6-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In Information and telecommunication technology (ICT) has penetrated deep into the human lives and is affecting human life style in different aspects. The rapid growth in ICT has embarked improvement in computing devices and computing techniques. Currently cloud computing is one of the most hyped innovation. It has several positive impacts like reduced cost, increased throughput, ease of use but it also had certain security issues that must be dealt with carefully. There are several techniques that can be used to overcome this major problem. In this paper we will analyse biometric authentication in cloud computing, it’s various techniques and how they are helpful in reducing the security threats. It provides a comprehensive and structured overview of biometric authentication for enhancing cloud security.

References
  1. D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, Mar. 2012.
  2. P. Mell and T. Grance, “Final Version of NIST Cloud Computing Definition Published.”
  3. A. Prasanth, M. Bajpei, V. Shrivastava, and R. G. Mishra, “Cloud Computing : A Survey of Associated Services Cloud Computing : A Survey of Associated Services,” vol. 13, pp. 1–15.
  4. A. Shakeabubakor, “Cloud Computing Services and Applications to Improve Productivity of University Researchers,” Int. J. Inf. Electron. Eng., vol. 5, no. 2, pp. 153–157, 2015.
  5. R. Buyya, R. Buyya, C. S. Yeo, C. S. Yeo, S. Venugopal, S. Venugopal, J. Broberg, J. Broberg, I. Brandic, and I. Brandic, “Cloud computing and emerging IT
  6. platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Futur. Gener. Comput. Syst., vol. 25, no. 6, p. 17, Jun. 2009.
  7. J. Kataria, “International Journal of Advanced Research in Computer Science and Software Engineering Exploring cloud computing and identification of its security issues,” vol. 3, no. 5, pp. 1116–1119, 2013.
  8. N. Serrano, G. Gallardo, and J. Hernantes, “Infrastructure as a Service and Cloud Technologies,” 2015.
  9. A. H. Al-hamami and J. Y. Al-juneidi, “Secure Mobile Cloud Computing Based-On Fingerprint,” vol. 5, no. 2, pp. 23–27, 2015.
  10. G. C. Deka, Handbook of Research on Securing Cloud-Based Databases with Biometric.
  11. A. a. Yassin, H. Jin, A. Ibrahim, W. Qiang, and D. Zou, “Efficient password-based two factors authentication in cloud computing,” Int. J. Secur. its Appl., vol. 6, no. 2, pp. 143–148, 2012.
  12. K.-A. T. Haizhou Li, Advanced topics in Biometrics. 2012.
  13. S. D. Deshpande, “Advances in Computational Research Review Paper On Introduction Of Various Biometric Areas,” vol. 7, no. 1, p. 9085, 2015.
  14. K.-S. W. and M.-H. Kim, “TOWARDS BIOMETRIC-BASED AUTHENTICATION FOR CLOUD COMPUTING,” in 2nd International Conference on Cloud Computing and Services Science, p. pages 501–510.
  15. Intelligent Biometric Techniques in Fingerprint and Face Recognition. CRC Press, 1999.
  16. H. Vallabhu and R. Satyanarayana, “Biometric Authentication as a Service on Cloud: Novel Solution,” Int. J. Soft Comput. Eng., vol. 2, no. 4, pp. 163–165, 2012.
  17. K. M. and M. M. Edward Guillen, Lina Alfonso, “Vulnerabilities and Performance Analysis over Fingerprint Biometric Authentication Network,” Proc. World Congr. Eng. Comput. Sci., 2012.
  18. “Secure Mobile Cloud Computing Based-On Fingerprint.” [Online]. Available: http://v1.wcsit.org/media/pub/2015/vol.5.no.2/Secure Mobile Cloud Computing Based-On Fingerprint.pdf. [Accessed: 24-May-2015].
  19. M. G. Kim, H. M. Moon, Y. Chung, and S. B. Pan, “A survey and proposed framework on the soft biometrics technique for human identification in intelligent video surveillance system,” J. Biomed. Biotechnol., vol. 2012, 2012.
  20. A. A. Pawle and V. P. Pawar, “Face Recognition System ( FRS ) on Cloud Computing for User Authentication,” no. 4, pp. 189–192, 2013.
  21. M. G. Kresimir Delac I, “A SURVEY OF BIOMETRIC RECOGNITION METHODS,” 46th Int. SyrnPoSium Electron. Mar., 2004.
  22. V. Teo, “Mobile Cloud Computing for Data-Intensive Applications,” Cscmuedu, pp. 1–9, 2011.
  23. E. S. Hamid Banirostam, “Functional Control of Users by Biometric Behavior Features in Cloud Computing,” 4th Int. Conf. Intell. Syst. Model. Simul., 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Keywords Cloud computing Security Data access Authorized user Biometric authentication Cloud Service Provider (CSP)