Design of Secure Biometric-based Access Mechanism for Cloud Services

Open Access

Year : 2023 | Volume : | : | Page : –
By

K. Vijay

K. Nagaraju

Y. Chetan

  1. Assistant Professor Department of Computer Science and Engineering, Siddhartha Institute of Technology and Sciences, Narapally, Hyderabad Telangana India
  2. Assistant Professor Department of Computer Science and Engineering, Siddhartha Institute of Technology and Sciences, Narapally, Hyderabad Telangana India
  3. Student Department of Computer Science and Engineering, Siddhartha Institute of Technology and Sciences, Narapally, Hyderabad Telangana India

Abstract

In our data-driven society, the demand for remote information storage and computation services is increasing exponentially, as is the need for secure access to such information and services. during this project, we have a tendency to style a replacement biometric-based authentication protocol to produce secure access to an overseas (cloud) server. Within the planned approach, we have a tendency to think about biometric information of a user as a secret credentials. We have a tendency to then derive a novel identity from the user’s biometric information that is more accustomed generate the user’s non-public key. Additionally, we have a tendency to propose Associate in nursing economical approach to come up with a session key between 2 act parties victimization 2 biometric templates for a secure message transmission. In different words, there’s no ought to store the user’s non-public key anyplace and therefore the session secret is generated while not sharing any previous info. A close Real-Or Random (ROR) model-based formal security analysis, informal (nonmathematical) security analysis, and formal security verification victimisation the widely accepted machine-controlled Validation of internet Security Protocols and Applications (AVISPA) tool show that the planned approach will withstand many well-known attacks against (passive/active) adversary.

Keywords: Biometric, Cloud services, Database, Mechanism

How to cite this article: K. Vijay, K. Nagaraju, Y. Chetan. Design of Secure Biometric-based Access Mechanism for Cloud Services. Journal of Experimental & Applied Mechanics. 2023; ():-.
How to cite this URL: K. Vijay, K. Nagaraju, Y. Chetan. Design of Secure Biometric-based Access Mechanism for Cloud Services. Journal of Experimental & Applied Mechanics. 2023; ():-. Available from: https://journals.stmjournals.com/joeam/article=2023/view=91770

Full Text PDF Download

References

1. A. Jain, L. Hong and S. Pankanti, “Biometric identification,” Communications of the ACM, vol. 43, no. 2, pp. 90–98, 2019.
2. R. Allen, P. Sankar and S. Prabhakar, “Fingerprint identification technology,” Biometric Systems, pp. 22–61, 2019.
3. J. de Mira, H. Neto, E. Neves, et al., “Biometric-oriented Iris Identification Based on Mathematical Morphology,” Journal of Signal Processing Systems, vol. 80, no. 2, pp. 181–195, 2015.
4. S. Romdhani, V. Blanz and T. Vetter, “Face identification by fitting a 3d morphable model using linear shape and texture error functions,” in European Conference on Computer Vision, pp. 3–19, 2015.
5. Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A survey of key management schemes in wireless sensor networks,” Journal of Computer Communications, vol. 30, no. 11–12, pp. 2314–2341, 2014.
6. X. Du, Y. Xiao, M. Guizani, and H.H. Chen, “An effective key management scheme for heterogeneous sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24–34, 2017.
7. X. Du and H.H. Chen, “Security in wireless sensor networks,” IEEE Wireless Communications Magazine, vol. 15, no. 4, pp. 60–66, 2014.
8. Stack Overflow-Where Developers Learn, Share, & Build Careers
9. Quora-A place to share knowledge and better understand the world
10. Intechopen.com. (2018). [online] Available at: https://www.intechopen.com/chapters/65920.


Open Access Article
Volume
Received May 18, 2022
Accepted June 6, 2022
Published January 6, 2023