Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing


  • Anusha Bodepudi Staff Engineer, Intuit, Plano, TX, USA
  • Manjunath Reddy Customer Engineering Lead, Qualcomm, San Diego, CA, USA
  • Sai Srujan Gutlapalli Data Engineer, TechnoVision Solutions LLC, Farmington Hills, MI 48335, USA
  • Mounika Mandapuram EKIN Solutions, 13800 Coppermine Rd, Herndon, VA 20171, USA



Computer Information Security, Certification, Cloud Computing, Fingerprints, Authentication, Character Recognition


User identity identification secures cloud computing. This study examined cloud service security authentication needs. Fingerprint recognition was used to create a new cloud security authentication system. The proposed system's design and process were thoroughly examined to secure cloud user data from unauthorized access. This study proposes a secure cloud server fingerprint match technique. Considering fingerprint uniqueness and stability, cloud security login authentication technology employing fingerprint recognition is researched to improve cloud services login security. Analyze the cloud security login system structure first. Next, fingerprint identification is explained. Finally, fingerprint identification of cloud security login systems is investigated from fingerprint registration, certification, fingerprint image processing perspectives, and a simple fingerprint image processing simulation. The results show that this login mechanism is secure and versatile. The biometric template is insecure, and stolen templates cannot be canceled, making user identity leaks easy. This work proposes indirect fingerprint authentication to address these issues. Finally, a thorough security analysis of the cloud computing method is offered.


Download data is not yet available.


A Amali, M. B., & Rama, N. (2017). Biometric Identification and Authentication Providence using Fingerprint for Cloud Data Access, International Journal of Electrical and Computer Engineering, 7(1), 408-416. DOI:

Alsmirat, M. A., Al-Alem, F., Al-Ayyoub, M., Jararweh, Y., & Gupta, B. (2019). Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimedia Tools and Applications, 78(3), 3649-3688. DOI:

Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2019). Voice Recognition Systems in the Cloud Networks: Has It Reached Its Full Potential? Asian Journal of Applied Science and Engineering, 8(1), 51–60. DOI:

Dassouki, K., Safa, H., Nassar, M., & Hijazi, A. (2017). Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints. Computers & Security, 70, 618. DOI:

Gupta & Quamara, M. (2018). An identity-based access control and mutual authentication framework for distributed cloud computing in the Internet of Things environment. ICCIDS Procedia Computer Science, 189-197. DOI:

Gutlapalli, S. S. (2017). The Role of Deep Learning in the Fourth Industrial Revolution: A Digital Transformation Approach. Asian Accounting and Auditing Advancement, 8(1), 52–56. Retrieved from

Gutlapalli, S. S., Mandapuram, M., Reddy, M., & Bodepudi, A. (2019). Evaluation of Hospital Information Systems (HIS) in terms of their Suitability for Tasks. Malaysian Journal of Medical and Biological Research, 6(2), 143–150. DOI:

Jiang, X. C., & Zheng, J. D. (2014). An Indirect Fingerprint Authentication Scheme in Cloud Computing. Applied Mechanics and Materials, 484-485, 986-990. DOI:

Juels, A. and Sudan, M. (2002). A fuzzy vault scheme. In Proc. IEEE Int. Symp. Inform. Theroy, Lausanne, Switzerland, p. 408. DOI:

Kalangi, R. R., & Rao, M. V. P. C. (2018). A novel multi-user fingerprint minutiae-based encryption and integrity verification for cloud data. International Journal of Advanced Computer Research, 8(37), 161-170. DOI:

Mandapuram, M. (2017). Application of Artificial Intelligence in Contemporary Business: An Analysis for Content Management System Optimization. Asian Business Review, 7(3), 117–122. DOI:

Mandapuram, M., & Hosen, M. F. (2018). The Object-Oriented Database Management System versus the Relational Database Management System: A Comparison. Global Disclosure of Economics and Business, 7(2), 89–96. DOI:

Mandapuram, M., Gutlapalli, S. S., Bodepudi, A., & Reddy, M. (2018). Investigating the Prospects of Generative Artificial Intelligence. Asian Journal of Humanity, Art and Literature, 5(2), 167–174. DOI:

Pang, X., Song, Z., & Xie, W. (2013). Extracting Valley-Ridge Lines from Point-Cloud-Based 3D Fingerprint Models. IEEE Computer Graphics and Applications, 33(4), 73-81.

Pang, X., Song, Z., & Xie, W. (2013). Extracting valley-ridge lines from point-cloud-based 3D fingerprint models. IEEE Computer Graphics and Applications, 33(4), 73-81. DOI:

Rajarajan, S., Kausik, R., Charan, M., & PLK. Priyadarsini. (2019). Privacy-Preserving Fingerprint Authentication at the Cloud Server for eHealth Services. EAI Endorsed Transactions on Pervasive Health and Technology, 5(18). DOI:

Reddy, M., Bodepudi, A., Mandapuram, M., & Gutlapalli, S. S. (2020). Face Detection and Recognition Techniques through the Cloud Network: An Exploratory Study. ABC Journal of Advanced Research, 9(2), 103–114. DOI:

Sabeetha, S. S., & Malarvizhi, N. (2021). Distributed deduplication with fingerprint index management model for big data storage in the cloud. Evolutionary Intelligence, 14(2), 683-690. DOI:

Shi, S., Cui, J., Xin-Li, Z., Liu, Y., Jing-Liang, G., & Yun-Jiang, W. (2019). Fingerprint Recognition Strategies Based on a Fuzzy Commitment for Cloud-Assisted IoT: A Minutiae-Based Sector Coding Approach. IEEE Access, 7, 44803-44812. DOI:

Tang, Y., Zhang, Y., & Zhang, N. (2015). Cloud Security Certification Technology Based on Fingerprint Recognition, Telecommunications Science, 31(8).

Thodupunori, S. R., & Gutlapalli, S. S. (2018). Overview of LeOra Software: A Statistical Tool for Decision Makers. 技术与管理回顾, 1(1), 7–11. http://技术与管理回顾.移动/index.php/tmr/article/view/4

Wu, H., Fan, J., Liu, J., & Zhang, J. (2014). Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm. Telecommunications Science, 30(11), 110-115. DOI:

Yang, J., Xiong, N., Vasilakos, A. V., Fang, Z., Park, D., Xu, X., Yoon, S., Xie, S., & Yang, Y. (2011). A Fingerprint Recognition Scheme Based on Assembling Invariant Moments for Cloud Computing Communications. IEEE Systems Journal, 5(4), 574-583. DOI:

Yassin, A. A. (2014). Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing. International Scholarly Research Notices, 2014. DOI:

Zhang, X. (2013). Design of Cloud Security Login System Based on Fingerprint Recognition, Dianshi Jishu (Video Engineering), 37(13), 166-171.

Zhang, X. (2013). Design of Cloud Security Login System Based on Fingerprint Recognition. Dianshi Jishu (Video Engineering), 37(13), 166-171.




How to Cite

Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2021). Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing. American Journal of Trade and Policy, 8(3), 231–238.



Policy and Practice Reviews