Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing

Authors

  • Anusha Bodepudi Staff Engineer, Intuit, Plano, TX, USA
  • Manjunath Reddy Customer Engineering Lead, Qualcomm, San Diego, CA, USA
  • Sai Srujan Gutlapalli Data Engineer, TechnoVision Solutions LLC, Farmington Hills, MI 48335, USA
  • Mounika Mandapuram EKIN Solutions, 13800 Coppermine Rd, Herndon, VA 20171, USA

DOI:

https://doi.org/10.18034/ajtp.v8i3.651

Keywords:

Computer Information Security, Certification, Cloud Computing, Fingerprints, Authentication, Character Recognition

Abstract

User identity identification secures cloud computing. This study examined cloud service security authentication needs. Fingerprint recognition was used to create a new cloud security authentication system. The proposed system's design and process were thoroughly examined to secure cloud user data from unauthorized access. This study proposes a secure cloud server fingerprint match technique. Considering fingerprint uniqueness and stability, cloud security login authentication technology employing fingerprint recognition is researched to improve cloud services login security. Analyze the cloud security login system structure first. Next, fingerprint identification is explained. Finally, fingerprint identification of cloud security login systems is investigated from fingerprint registration, certification, fingerprint image processing perspectives, and a simple fingerprint image processing simulation. The results show that this login mechanism is secure and versatile. The biometric template is insecure, and stolen templates cannot be canceled, making user identity leaks easy. This work proposes indirect fingerprint authentication to address these issues. Finally, a thorough security analysis of the cloud computing method is offered.

Downloads

Download data is not yet available.

References

A Amali, M. B., & Rama, N. (2017). Biometric Identification and Authentication Providence using Fingerprint for Cloud Data Access, International Journal of Electrical and Computer Engineering, 7(1), 408-416. DOI: https://doi.org/10.11591/ijece.v7i1.pp408-416

Alsmirat, M. A., Al-Alem, F., Al-Ayyoub, M., Jararweh, Y., & Gupta, B. (2019). Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimedia Tools and Applications, 78(3), 3649-3688. https://doi.org/10.1007/s11042-017-5537-5 DOI: https://doi.org/10.1007/s11042-017-5537-5

Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2019). Voice Recognition Systems in the Cloud Networks: Has It Reached Its Full Potential? Asian Journal of Applied Science and Engineering, 8(1), 51–60. https://doi.org/10.18034/ajase.v8i1.12 DOI: https://doi.org/10.18034/ajase.v8i1.12

Dassouki, K., Safa, H., Nassar, M., & Hijazi, A. (2017). Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints. Computers & Security, 70, 618. DOI: https://doi.org/10.1016/j.cose.2017.08.003

Gupta & Quamara, M. (2018). An identity-based access control and mutual authentication framework for distributed cloud computing in the Internet of Things environment. ICCIDS Procedia Computer Science, 189-197. DOI: https://doi.org/10.1016/j.procs.2018.05.185

Gutlapalli, S. S. (2017). The Role of Deep Learning in the Fourth Industrial Revolution: A Digital Transformation Approach. Asian Accounting and Auditing Advancement, 8(1), 52–56. Retrieved from https://4ajournal.com/article/view/77

Gutlapalli, S. S., Mandapuram, M., Reddy, M., & Bodepudi, A. (2019). Evaluation of Hospital Information Systems (HIS) in terms of their Suitability for Tasks. Malaysian Journal of Medical and Biological Research, 6(2), 143–150. https://doi.org/10.18034/mjmbr.v6i2.661 DOI: https://doi.org/10.18034/mjmbr.v6i2.661

Jiang, X. C., & Zheng, J. D. (2014). An Indirect Fingerprint Authentication Scheme in Cloud Computing. Applied Mechanics and Materials, 484-485, 986-990. https://doi.org/10.4028/www.scientific.net/AMM.484-485.986 DOI: https://doi.org/10.4028/www.scientific.net/AMM.484-485.986

Juels, A. and Sudan, M. (2002). A fuzzy vault scheme. In Proc. IEEE Int. Symp. Inform. Theroy, Lausanne, Switzerland, p. 408. DOI: https://doi.org/10.1109/ISIT.2002.1023680

Kalangi, R. R., & Rao, M. V. P. C. (2018). A novel multi-user fingerprint minutiae-based encryption and integrity verification for cloud data. International Journal of Advanced Computer Research, 8(37), 161-170. https://doi.org/10.19101/IJACR2018.837010 DOI: https://doi.org/10.19101/IJACR.2018.837010

Mandapuram, M. (2017). Application of Artificial Intelligence in Contemporary Business: An Analysis for Content Management System Optimization. Asian Business Review, 7(3), 117–122. https://doi.org/10.18034/abr.v7i3.650 DOI: https://doi.org/10.18034/abr.v7i3.650

Mandapuram, M., & Hosen, M. F. (2018). The Object-Oriented Database Management System versus the Relational Database Management System: A Comparison. Global Disclosure of Economics and Business, 7(2), 89–96. https://doi.org/10.18034/gdeb.v7i2.657 DOI: https://doi.org/10.18034/gdeb.v7i2.657

Mandapuram, M., Gutlapalli, S. S., Bodepudi, A., & Reddy, M. (2018). Investigating the Prospects of Generative Artificial Intelligence. Asian Journal of Humanity, Art and Literature, 5(2), 167–174. https://doi.org/10.18034/ajhal.v5i2.659 DOI: https://doi.org/10.18034/ajhal.v5i2.659

Pang, X., Song, Z., & Xie, W. (2013). Extracting Valley-Ridge Lines from Point-Cloud-Based 3D Fingerprint Models. IEEE Computer Graphics and Applications, 33(4), 73-81. https://doi.org/10.1109/MCG.2012.128

Pang, X., Song, Z., & Xie, W. (2013). Extracting valley-ridge lines from point-cloud-based 3D fingerprint models. IEEE Computer Graphics and Applications, 33(4), 73-81. https://doi.org/10.1109/MCG.2012.128 DOI: https://doi.org/10.1109/MCG.2012.128

Rajarajan, S., Kausik, R., Charan, M., & PLK. Priyadarsini. (2019). Privacy-Preserving Fingerprint Authentication at the Cloud Server for eHealth Services. EAI Endorsed Transactions on Pervasive Health and Technology, 5(18). https://doi.org/10.4108/eai.13-7-2018.162688 DOI: https://doi.org/10.4108/eai.13-7-2018.162688

Reddy, M., Bodepudi, A., Mandapuram, M., & Gutlapalli, S. S. (2020). Face Detection and Recognition Techniques through the Cloud Network: An Exploratory Study. ABC Journal of Advanced Research, 9(2), 103–114. https://doi.org/10.18034/abcjar.v9i2.660 DOI: https://doi.org/10.18034/abcjar.v9i2.660

Sabeetha, S. S., & Malarvizhi, N. (2021). Distributed deduplication with fingerprint index management model for big data storage in the cloud. Evolutionary Intelligence, 14(2), 683-690. https://doi.org/10.1007/s12065-020-00395-8 DOI: https://doi.org/10.1007/s12065-020-00395-8

Shi, S., Cui, J., Xin-Li, Z., Liu, Y., Jing-Liang, G., & Yun-Jiang, W. (2019). Fingerprint Recognition Strategies Based on a Fuzzy Commitment for Cloud-Assisted IoT: A Minutiae-Based Sector Coding Approach. IEEE Access, 7, 44803-44812. https://doi.org/10.1109/ACCESS.2019.2906265 DOI: https://doi.org/10.1109/ACCESS.2019.2906265

Tang, Y., Zhang, Y., & Zhang, N. (2015). Cloud Security Certification Technology Based on Fingerprint Recognition, Telecommunications Science, 31(8).

Thodupunori, S. R., & Gutlapalli, S. S. (2018). Overview of LeOra Software: A Statistical Tool for Decision Makers. 技术与管理回顾, 1(1), 7–11. http://技术与管理回顾.移动/index.php/tmr/article/view/4

Wu, H., Fan, J., Liu, J., & Zhang, J. (2014). Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm. Telecommunications Science, 30(11), 110-115. https://doi.org/10.3969/j.issn.1000-0801.2014.11.019 DOI: https://doi.org/10.1016/j.diin.2014.02.002

Yang, J., Xiong, N., Vasilakos, A. V., Fang, Z., Park, D., Xu, X., Yoon, S., Xie, S., & Yang, Y. (2011). A Fingerprint Recognition Scheme Based on Assembling Invariant Moments for Cloud Computing Communications. IEEE Systems Journal, 5(4), 574-583. https://doi.org/10.1109/JSYST.2011.2165600 DOI: https://doi.org/10.1109/JSYST.2011.2165600

Yassin, A. A. (2014). Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing. International Scholarly Research Notices, 2014. https://doi.org/10.1155/2014/351696 DOI: https://doi.org/10.1155/2014/351696

Zhang, X. (2013). Design of Cloud Security Login System Based on Fingerprint Recognition, Dianshi Jishu (Video Engineering), 37(13), 166-171.

Zhang, X. (2013). Design of Cloud Security Login System Based on Fingerprint Recognition. Dianshi Jishu (Video Engineering), 37(13), 166-171.

Downloads

Published

2021-12-31

How to Cite

Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2021). Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing. American Journal of Trade and Policy, 8(3), 231–238. https://doi.org/10.18034/ajtp.v8i3.651

Issue

Section

Policy and Practice Reviews