We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Biometric-based Authentication Techniques for Securing Cloud Computing Data - A Survey

by Asmaa M. Hussein, Hala M. Abbas, Mostafa-Sami M. Mostafa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 23
Year of Publication: 2018
Authors: Asmaa M. Hussein, Hala M. Abbas, Mostafa-Sami M. Mostafa
10.5120/ijca2018916509

Asmaa M. Hussein, Hala M. Abbas, Mostafa-Sami M. Mostafa . Biometric-based Authentication Techniques for Securing Cloud Computing Data - A Survey. International Journal of Computer Applications. 179, 23 ( Feb 2018), 44-52. DOI=10.5120/ijca2018916509

@article{ 10.5120/ijca2018916509,
author = { Asmaa M. Hussein, Hala M. Abbas, Mostafa-Sami M. Mostafa },
title = { Biometric-based Authentication Techniques for Securing Cloud Computing Data - A Survey },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2018 },
volume = { 179 },
number = { 23 },
month = { Feb },
year = { 2018 },
issn = { 0975-8887 },
pages = { 44-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number23/29012-2018916509/ },
doi = { 10.5120/ijca2018916509 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:56:16.760749+05:30
%A Asmaa M. Hussein
%A Hala M. Abbas
%A Mostafa-Sami M. Mostafa
%T Biometric-based Authentication Techniques for Securing Cloud Computing Data - A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 23
%P 44-52
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is the most growing paradigm for delivering computational resources as a service over the internet. By 2018, many different enterprises have adopted this utility-based computing for reducing the operational and capital expenditure of building their infrastructure network, buying software licenses, hiring IT teams and other requirements. With this unlimited growth of using cloud services and the multi-tenancy nature of sharing cloud service instance between different consumers and enterprises, securing accessing to the data of the cloud became a major issue. Traditional authentication techniques and credentials does not provide enough security against the modern means of attacks. So, new biometric-based authentication techniques have been discovered to overcome the loop holes. Here we present a comprehensive survey on the existing user’s authentication techniques especially biometric-based techniques used for accessing cloud data.

References
  1. Mell P, Grance T, et al. The NIST definition of cloud computing. 2011;Http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. Available from: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
  2. Banyal RK, Jain P, Jain VK. Multi-factor authentication framework for cloud computing. In: Computational Intelligence, Modelling and Simulation (CIMSim), 2013 Fifth International Conference on. IEEE; 2013. p. 105–110.
  3. Hogan M, Liu F, Sokol A, Tong J. Nist cloud computing standards roadmap. NIST Special Publication. 2011;35.
  4. Yang J, Chen Z. Cloud computing research and security issues. In: Computational intelligence and software engineering (CiSE), 2010 international conference on. IEEE; 2010. p. 1–3.
  5. Google. Google Apps., G Suite Gmail, Docs, Drive, Calendar and More for Business;. Accessed: 16-12-2017. http://www.google.com/apps/.
  6. Salesforce. Cloud apps and platform. CRM applications and software solutions;. Accessed: 16-12-2017. http://www.salesforce.com/eu/crm/products.jsp.
  7. Donald AC, Arockiam L. Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues. International Journal of Computer Applications. 2014;94(1).
  8. Microsoft. Microsoft Azure Cloud Computing Platform & Services;. Accessed: 16-12-2017. http://www.microsoft.com/windowsazure/.
  9. Amazon. Amazon Elastic Compute Cloud (EC2)- Amazon Web Services, Inc.;. Accessed: 16-12-2017. http://aws.amazon.com/ec2/.
  10. Amazon. Amazon Simple Storage Service (S3) — Cloud Storage — AWS;. Accessed: 16-12-2017. https://aws.amazon.com/s3/.
  11. Krutz RL, Vines RD. Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing; 2010.
  12. Anzaku ET, Sohn H, Ro YM. Multi-factor authentication using fingerprints and user-specific random projection. In: Web Conference (APWEB), 2010 12th International Asia-Pacific. IEEE; 2010. p. 415–418.
  13. Modi M, Upadhaya H, Thakor M. Password less authentication using keystroke dynamics a survey. International Journal of Innovative Research in Computer and Communication Engineering, IJIRCCE. 2014;p. 7060–7064.
  14. Babaeizadeh M, Bakhtiari M, Mohammed AM. Authentication methods in cloud computing: A survey. Research Journal of Applied Sciences, Engineering and Technology. 2015;9(8):655–664.
  15. Gurav SM, Gawade LS, Rane PK, Khochare NR. Graphical password authentication: Cloud securing scheme. In: Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on. IEEE; 2014. p. 479–483.
  16. Abhishek K, Roshan S, Kumar P, Ranjan R. A comprehensive study on multifactor authentication schemes. In: Advances in Computing and Information Technology. Springer; 2013. p. 561–568.
  17. Acar T, Belenkiy M, Küpçü A. Single password authentication. Computer Networks. 2013;57(13):2597–2614.
  18. Chouhan P, Singh R. Security Attacks on Cloud Computing With Possible Solution. International Journal of Advanced Research in Computer Science and Software Engineering. 2016;6(1).
  19. Ratha NK, Connell JH, Bolle RM. Enhancing security and privacy in biometrics-based authentication systems. IBM systems Journal. 2001;40(3):614–634.
  20. Yang S, Bal G. Balancing Security and Usability of Local Security Mechanisms for Mobile Devices. Information Security and Privacy Research. 2012;p. 327–338.
  21. Ali ML, Monaco JV, Tappert CC, Qiu M. Keystroke biometric systems for user authentication. Journal of Signal Processing Systems. 2017;86(2-3):175–190.
  22. Abo-alian A, Badr NL, Tolba MF. Keystroke dynamics-based user authentication service for cloud computing. Concurrency and Computation: Practice and Experience. 2016;28(9):2567–2585.
  23. Yassin AA, Jin H, Ibrahim A, Qiang W, Zou D. A practical privacy-preserving password authentication scheme for cloud computing. In: Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2012 IEEE 26th International. IEEE; 2012. p. 1210–1217.
  24. Chen TH, Yeh Hl, Shih WK. An advanced ecc dynamic id-based remote mutual authentication scheme for cloud computing. In: Multimedia and Ubiquitous Engineering (MUE), 2011 5th FTRA International Conference on. IEEE; 2011. p. 155–159.
  25. Choudhury AJ, Kumar P, Sain M, Lim H, Jae-Lee H. A strong user authentication framework for cloud computing. In: Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific. IEEE; 2011. p. 110–115.
  26. Nayak SK, Mohapatra S, Majhi B. An improved mutual authentication framework for cloud computing. International Journal of Computer Applications. 2012;52(5).
  27. Subramaniam T, Deepa B. Security Attack Issues and Mitigation Techniques in Cloud Computing Environments. International Journal of UbiComp. 2016;7(1):1–11.
  28. Henderson N. Hackers Use Social Engineering to Compromise CloudFlare CEO Gmail Account. http://wwwthewhircom/web-hosting-news/hackers-use-social-engineering-to-compromise-cloudflare-ceo-gmail-account. Monday, JUNE 2012;.
  29. Mondal S, Bours P. A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing. 2017;230:1–22.
  30. Matyas V, Riha Z. Toward reliable user authentication through biometrics. IEEE Security & Privacy. 2003;99(3):45–49.
  31. Meng W, Wong DS, Furnell S, Zhou J. Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Communications Surveys Tutorials. 2015 thirdquarter;17(3):1268–1293.
  32. Johansen UA. Keystroke dynamics on a device with touch screen; 2012.
  33. Wong KS, Kim MH. Towards Biometric-based Authentication for Cloud Computing. In: CLOSER; 2012. p. 501–510.
  34. Naveed G, Batool R. Biometric Authentication in Cloud Computing. Journal of Biometrics & Biostatistics. 2015;6(5):1.
  35. Vallabhu H, Satyanarayana R. Biometric authentication as a service on cloud: Novel solution. International Journal of Soft Computing and Engineering. 2012;2(4):163.
  36. Jain AK, Ross A, Prabhakar S. An introduction to biometric recognition. IEEE Transactions on circuits and systems for video technology. 2004;14(1):4–20.
  37. Giot R, El-Abed M, Hemery B, Rosenberger C. Unconstrained keystroke dynamics authentication with shared secret. Computers & security. 2011;30(6):427–445.
  38. Monaco JV. Classification and authentication of one-dimensional behavioral biometrics. In: Biometrics (IJCB), 2014 IEEE International Joint Conference on. IEEE; 2014. p. 1–8.
  39. Olzak T. Keystroke Dynamics: Low Impact Biometric Verification. Information Security. 2006;p. 1–10.
  40. Pawle AA, Pawar VP. Face recognition system (FRS) on cloud computing for user authentication. International Journal of Soft Computing and Engineering (IJSCE). 2013;3(4).
  41. Atmakuri SM. A study of authentication techniques for mobile cloud computing. Texas A&M University-Kingsville; 2015.
  42. Padma P, Srinivasan S. A survey on biometric based authentication in cloud computing. In: Inventive Computation Technologies (ICICT), International Conference on. vol. 1. IEEE; 2016. p. 1–5.
  43. Al-Hamami AH, AL-Juneidi JY. Secure Mobile Cloud Computing Based-On Fingerprint. World of Computer Science & Information Technology Journal. 2015;5(2).
  44. Chadha A, Satam N, Wali V. Biometric Signature Processing & Recognition Using Radial Basis Function Network. arXiv preprint arXiv:13111694. 2013;.
  45. Guo JM, Hsia CH, Liu YF, Yu JC, Chu MH, Le TN. Contact-free hand geometry-based identification system. Expert Systems with Applications. 2012;39(14):11728–11736.
  46. Rassan IA, Al Shaher H. Securing mobile cloud using finger print authentication. International Journal of Network Security & Its Applications. 2013;5(6):41.
  47. Sabri HM, Ghany KKA, Hefny HA, Elkhameesy N. Biometrics template security on cloud computing. In: Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on. IEEE; 2014. p. 672–676.
  48. Venakatesan N, Kumar MR. Finger print authentication for improved Cloud Security. In: Computation System and Information Technology for Sustainable Solutions (CSITSS), International Conference on. IEEE; 2016. p. 434–439.
  49. Ross A, Dass S, Jain A. A deformable model for fingerprint matching. Pattern Recognition. 2005;38(1):95–103.
  50. Aishwariya G, Kokilapriya S, Adhithya S, Selvarani AG. Fingerprint Recognition for Android Application Data Retrieval. 2017;.
  51. Deka GC. Handbook of Research on Securing Cloud-Based Databases with Biometric Applications. IGI Global; 2014.
  52. Juhola M, Zhang Y, Rasku J. Biometric verification of a subject through eye movements. Computers in biology and medicine. 2013;43(1):42–50.
  53. Abduljabbar ZA, Jin H, Hussien ZA, Yassin AA, Hussain MA, Abbdal SH, et al. Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment. In: Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 2016 IEEE 2nd International Conference on. IEEE; 2016. p. 146–151.
  54. Darve NR, Theng DP. Comparison of biometric and non-biometric security techniques in mobile cloud computing. In: Electronics and Communication Systems (ICECS), 2015 2nd International Conference on. IEEE; 2015. p. 213–216.
  55. Delac K, Grgic M. A survey of biometric recognition methods. In: Electronics in Marine, 2004. Proceedings Elmar 2004. 46th International Symposium. IEEE; 2004. p. 184–193.
  56. Kratz S, Aumi MTI. AirAuth: a biometric authentication system using in-air hand gestures. In: CHI’14 Extended Abstracts on Human Factors in Computing Systems. ACM; 2014. p. 499–502.
  57. Ziyad S, Kannammal A. A multifactor biometric authentication for the cloud. In: Computational Intelligence, Cyber Security and Computational Models. Springer; 2014. p. 395–403.
  58. Baloul M, Cherrier E, Rosenberger C. Challenge-based speaker recognition for mobile authentication. In: Biometrics Special Interest Group (BIOSIG), 2012 BIOSIG-Proceedings of the International Conference of the. IEEE; 2012. p. 1–7.
  59. com T. Biometric Signatures;. Accessed 27-12-2017. http://www.technologyyours.com/bio-signature.aspx.
  60. Rosa L. Biometric Signature Recognition;. Accessed 27-12-2017. http://www.advancedsourcecode.com/neuralsignature.asp.
  61. Yassin AA, Jin H, Ibrahim A, Zou D. Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. In: Cloud and Green Computing (CGC), 2012 Second International Conference on. IEEE; 2012. p. 282–289.
  62. Ryan S. Mobile keystroke dynamics: assessment and implementation. California State University, Northridge; 2015.
  63. Draffin B, Zhu J, Zhang J. Keysens: Passive user authentication through micro-behavior modeling of soft keyboard interaction. In: International Conference on Mobile Computing, Applications, and Services. Springer; 2013. p. 184–201.
  64. Teh PS, Teoh ABJ, Yue S. A survey of keystroke dynamics biometrics. The Scientific World Journal. 2013;2013.
  65. D’Lima N, Mittal J. Password authentication using keystroke biometrics. In: Communication, Information & Computing Technology (ICCICT), 2015 International Conference on. IEEE; 2015. p. 1–6.
  66. Roth J, Liu X, Metaxas D. On continuous user authentication via typing behavior. IEEE Transactions on Image Processing. 2014;23(10):4611–4624.
  67. Miya J, Bhatt M, Gupta M, Anas M. A Two Factor Authentication System for Touchscreen Mobile Devices Using Static Keystroke Dynamics and Password. 2017;.
  68. Derawi MO, Nickel C, Bours P, Busch C. Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on. IEEE; 2010. p. 306–311.
  69. Jain AK, Ross AA, Nandakumar K. Introduction. In: Introduction to Biometrics. Springer; 2011. p. 1–49.
  70. Shrivasatva M. Keystroke dynamics for mobile devices–algorithm and authentication. San Diego State University. 2011;PhD diss.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cloud Security User authentication techniques Biometric authentication.