alexa Biometric Authentication in Cloud Computing | OMICS International
ISSN: 2155-6180
Journal of Biometrics & Biostatistics
Like us on:
Make the best use of Scientific Research and information from our 700+ peer reviewed, Open Access Journals that operates with the help of 50,000+ Editorial Board Members and esteemed reviewers and 1000+ Scientific associations in Medical, Clinical, Pharmaceutical, Engineering, Technology and Management Fields.
Meet Inspiring Speakers and Experts at our 3000+ Global Conferenceseries Events with over 600+ Conferences, 1200+ Symposiums and 1200+ Workshops on
Medical, Pharma, Engineering, Science, Technology and Business

Biometric Authentication in Cloud Computing

Ghazal Naveed* and Rakhshanda Batool

Department of Computer Science, COMSATS Institute of Information Technology, Islamabad, Pakistan

*Corresponding Author:
Ghazal Naveed
Assistant Professor, Department of Computer Science
COMSATS Institute of Information Technology
Islamabad, Pakistan
Tel:
+92-51-8354444
E-mail:
[email protected]

Received date: September 14, 2015; Accepted date: September 21, 2015; Published date: October 05, 2015

Citation: Naveed G, Batool R (2015) Biometric Authentication in Cloud Computing.J Biom Biostat 6:258. doi:10.4172/2155-6180.1000258

Copyright:© 2015 Naveed G, et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Visit for more related articles at Journal of Biometrics & Biostatistics

Abstract

Information and telecommunication technology (ICT) has penetrated deep into the human lives and is affecting human life style in different aspects. The rapid growth in ICT has embarked improvement in computing devices and computing techniques. Currently cloud computing is one of the most hyped innovation. It has several positive impacts like reduce cost, increase throughput, ease of use but it also have certain security issues that must be dealt with carefully. There are several techniques that can be used to overcome this major problem. In this paper will analyses biometric authentication in cloud computing, its various techniques and how they are helpful in reducing the security threats. It provides a comprehensive and structured overview of biometric authentication for enhancing cloud security.

Keywords

Cloud computing, Security; Data access; Authorized user; Biometric authentication; Cloud Service Provider (CSP)

Introduction

For the ease of users, concept of cloud computing took popularity in 1990’s though its concepts lasts back to 1960s [1]. Cloud Computing refers to provision of scalable and IT related services to the users through internet. It is a technique of computing in which dynamically scalable and IT related resources are provided as a service through Internet. This model permits general, supportive, on-interest system right to use to a common group of configurable figuring assets. These resources are rapidly allocated and unconfined with a minor organization’s effort [2]. Resources may include systems, servers, application programs or any kind of administrative programs.

It provides 3 different kinds of service models:

1. Software as a service has the ability to provide user any software running on a cloud substructure.

2. Platform can also be provided as a service. In this any kind of platform (i.e. tools, library, services).

is provided as a service of which user has no control but he/she can use it.

3. Infrastructure as a service facilitates the user by providing computing resources where user can run the software without having control on underlying infrastructure but has control over the operating system being used [1].

Four deployment models are used in cloud computing:

2. Community cloud is shared by several users.

3. Private cloud facilitates a private organization.

4. Hybrid cloud structure consists of two or more than two cloud models [2].

Services of cloud computing are being provided by dierent companies known as Cloud Service Providers (CSPs). CSPs provide the services to users on pay only for use strategy [3]. Cloud Computing faces various types of security concerns that include virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and authentication and password [4]. Cloud computing platform has not provided appropriate physical protection procedures, and all protection mechanisms depend extraordinarily on the mechanism of au-thenticating the user. User authentication calls for an extremely assured security.

To solve security issues in cloud computing different techniques are being used. One of the authentica-tion mechanisms is password authentication. Most clients pick something easy to memorize, for example, telephone number, most precious pleasures and name as their passwords. These things are effortlessly to retain. Thus, adversary can assemble a chart of noteworthy disputes to transgress framework. This process is known as dictionary attack. Another technique is smart card based authentication. It is a two factor authentication. In the first influence, clients’ examination accreditations are secured in the smart card and in second influence the card is being safeguarded by using a password. The two components needn’t bother with the server to store a secret key record. The drawback of this technique is that it is not a basic gadget, and the card reader considers an additional cost. It additionally requires extra mid-dleware application to acquire a match between smart card and correspondence models. Most important of these techniques is biometric authentication. It is a form of authentication in which physiological traits of human beings are used to identify or verify the authenticated user [5] (Figure 1).

biometrics-biostatistics-behavioral-biometric

Figure 1: Physiological and behavioral biometric Traits [4].

Biometrics is a Greek word, based on two words, bio meaning life and metric meaning to measure. Biometrics also known as biometric authentication states the proof of identity of humans by their characteristics or traits. In computer science it is used as a practice of identification. Biometric frameworks permit recognizable proof of people taking into account behavioral or physiological attributes. To ac-complish more dependable confirmation or ID we ought to utilize something that truly describes the individual.

Biometric techniques are largely centred on face, fingerprint and iris detection, verification and identifi-cation systems. Normally detection is the first step in vision procedures. In detection process, system only checks whether face, iris, fingerprint exists for reading procedure and do not match with the ex- isting data. After registration when the user wants to use the service of cloud, detection is followed by the verification process. During this process data detected by the system is matched with the already existing data of the individuals. If any match occurs then user is authorized to use the service otherwise an error message is sent to the user. Biometrics deal with programmed approaches including character check or distinguishing proof on the standard of quantifiable physiological or behavioral qualities, for example, a finger impression or a voice test [6]. In this paper biometric authentication will be discussed in detail (Figure 2).

biometrics-biostatistics-behavioral-authentication-mechanism

Figure 2: Biometric Authentication Mechanism [7].

Related Work

In this survey paper we will analyse dierent kinds of biometric authentication schemes that are being used by various CSPS, their working and also examine the most authenticated technique.

Finger Prints Recognition

Fingerprint refers to an arrangement of elevations and valleys on the exteriors of the finger whose formation is firm. Fingerprint patterns of twins are different from each other [7]. Arrangement of the rims and structures do not change during the course of the lifespan of the human beings unless there is any noteworthy injury that crafts an everlasting scratch [8]. Fingerprint recognition refers to the mech- anized process of ascertaining the uniqueness of a single centred on the evaluation of two impressions. Fingerprint recognition is very famous because it is easy to use, an old method and is highly acceptable in the whole world. It is referred to the computerized way to validate a match between two human fingerprints [9]. The aridity, wetness of fingers and dirty fingers can disturb the scheme and result in inaccuracy.

Fingerprint sensors are used in this technique. They provide a scanned image of the finger. A unique password is created on the basis of fingerprint. Image and password both are stored in the database of the CSP. After registration when the user wants to use the service again, his/her fingerprint is sensed by the sensor and is sent to CSP where matching process is done with the already stored image. If the password of the read finger is valid only then the user can be allowed to use the desired service [10,11].

Facial Recognition

Face is being used as a biometric recognition as traits of face differ from person to person. This is a discrete and is suitable for furtive recognition applications. In face recognition technique features of the face are extracted. Sometimes 2-dimensional image of the face is taken and then stored in the database. In verification procedure 2-dimensional facial features being extracted are matched by the already stored template by using a match engine.

It is preferred that this mechanism should be automatic. The system automatically detects the face, takes its image, and after extracting the features saves it in the data base [8]. It is a cheap technology and gives a quick identification response [12]. It encounters a major problem that as face is referred as a social organ, its expressions are being changed [4].

Iris Recognition

Iris is a circular part surrounding the pupil inside the human eye. It consists of different complex arrangements and is green, blue, black or grey in color. Iris recognition is a technique used to recognize individuals based on unique arrangements in iris. Patterns present in iris are recognizable and are unique to every human. It is used an important biometric recognition technique [4].

In this mechanism identification and verification processes are carried out. In identification process im- age of eye is taken using a digital camera of high resolution. Image can be processed by using infrared or visible waves. It is stored in database of the CSP. In verification process special program is used by the computer to check whether the image taken match with the already stored image of the iris or not. Computer program used for matching purpose is called a matching engine. It has a high computational power and can process millions of images for matching per second.

Accuracy of iris recognition is more as compared to finger print recognition but less precise than retina recognition. It is less insensitive as compared to the retina recognition as iris is easily visible from a distance of a few meters. Twins also possess different iris structures. This technique provides a secondary verification. In this verification iris is subjected to light medium as reactions of the iris changes in light and these responses are also different [13].

Conclusion

For getting accurate results iris should not be far than a few meters from the camera and it must be ensured that the iris must be stationary. Different procedures are used to ensure that the image is real instead of a photograph. The image can be vague if contact lens is being used. Ensure that reflections should not be produced by the light source. If it happens image can be unclear. Certain sorts of contact lenses and glasses can darken the iris design [14]. The comparison of various biometric techniques used in cloud computing has been shown in Tables 1 and 2 [15].

Biometric Identifier Universality Distinctiveness Permanence Collectability
Face H L M H
Facial Thermogram H H L H
Finger print M H H M
Iris H H H M
Retina H H M L
Voice M L L M

Table 1: Comparison of Different Biometric Techniques.

Method Function mechanism Advantages Disadvantages
Finger print Difference between human finger prints Very low error rate, being used for over 10 years Dirty or damaged fingers can affect accuracy
Iris Using laser or infrared beam Very reliable with low error rate Members phobia to expose eyes to light
Facial Using face expressions and physical measures Simply accepted by users Not much accurate due to changing facial expressions
Retina Imaging of retina Very reliable with low error rate Members phobia to expose eyes to light

Table 2: Comparison of various Biometric methods used in cloud computing.

References

Select your language of interest to view the total content in your interested language
Post your comment

Share This Article

Relevant Topics

Article Usage

  • Total views: 9093
  • [From(publication date):
    December-2015 - Dec 13, 2017]
  • Breakdown by view type
  • HTML page views : 8800
  • PDF downloads : 293

Review summary

  1. Sneha
    Posted on Jun 29 2016 at 5:14 pm
    hello This was really informative I have a question - if I m using cloud and biometric finger authentication system whose data is stored on the cloud and if for all the valid users whose data is on cloud i want to send them a message after coming in a specified range of network with cloud......Can you suggest does cloud has some platform or service that supports messaging to those users who are authenticated ?
 

Post your comment

captcha   Reload  Can't read the image? click here to refresh

Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

Agri & Aquaculture Journals

Dr. Krish

[email protected]

1-702-714-7001Extn: 9040

Biochemistry Journals

Datta A

[email protected]

1-702-714-7001Extn: 9037

Business & Management Journals

Ronald

[email protected]

1-702-714-7001Extn: 9042

Chemistry Journals

Gabriel Shaw

[email protected]

1-702-714-7001Extn: 9040

Clinical Journals

Datta A

[email protected]

1-702-714-7001Extn: 9037

Engineering Journals

James Franklin

[email protected]

1-702-714-7001Extn: 9042

Food & Nutrition Journals

Katie Wilson

[email protected]

1-702-714-7001Extn: 9042

General Science

Andrea Jason

[email protected]

1-702-714-7001Extn: 9043

Genetics & Molecular Biology Journals

Anna Melissa

[email protected]

1-702-714-7001Extn: 9006

Immunology & Microbiology Journals

David Gorantl

[email protected]

1-702-714-7001Extn: 9014

Materials Science Journals

Rachle Green

[email protected]

1-702-714-7001Extn: 9039

Nursing & Health Care Journals

Stephanie Skinner

[email protected]

1-702-714-7001Extn: 9039

Medical Journals

Nimmi Anna

[email protected]

1-702-714-7001Extn: 9038

Neuroscience & Psychology Journals

Nathan T

[email protected]

1-702-714-7001Extn: 9041

Pharmaceutical Sciences Journals

Ann Jose

[email protected]

1-702-714-7001Extn: 9007

Social & Political Science Journals

Steve Harry

[email protected]

1-702-714-7001Extn: 9042

 
© 2008- 2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version