Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing
DOI:
https://doi.org/10.18034/ajtp.v8i3.651Keywords:
Computer Information Security, Certification, Cloud Computing, Fingerprints, Authentication, Character RecognitionAbstract
User identity identification secures cloud computing. This study examined cloud service security authentication needs. Fingerprint recognition was used to create a new cloud security authentication system. The proposed system's design and process were thoroughly examined to secure cloud user data from unauthorized access. This study proposes a secure cloud server fingerprint match technique. Considering fingerprint uniqueness and stability, cloud security login authentication technology employing fingerprint recognition is researched to improve cloud services login security. Analyze the cloud security login system structure first. Next, fingerprint identification is explained. Finally, fingerprint identification of cloud security login systems is investigated from fingerprint registration, certification, fingerprint image processing perspectives, and a simple fingerprint image processing simulation. The results show that this login mechanism is secure and versatile. The biometric template is insecure, and stolen templates cannot be canceled, making user identity leaks easy. This work proposes indirect fingerprint authentication to address these issues. Finally, a thorough security analysis of the cloud computing method is offered.
Downloads
References
A Amali, M. B., & Rama, N. (2017). Biometric Identification and Authentication Providence using Fingerprint for Cloud Data Access, International Journal of Electrical and Computer Engineering, 7(1), 408-416. DOI: https://doi.org/10.11591/ijece.v7i1.pp408-416
Alsmirat, M. A., Al-Alem, F., Al-Ayyoub, M., Jararweh, Y., & Gupta, B. (2019). Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimedia Tools and Applications, 78(3), 3649-3688. https://doi.org/10.1007/s11042-017-5537-5 DOI: https://doi.org/10.1007/s11042-017-5537-5
Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2019). Voice Recognition Systems in the Cloud Networks: Has It Reached Its Full Potential? Asian Journal of Applied Science and Engineering, 8(1), 51–60. https://doi.org/10.18034/ajase.v8i1.12 DOI: https://doi.org/10.18034/ajase.v8i1.12
Dassouki, K., Safa, H., Nassar, M., & Hijazi, A. (2017). Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints. Computers & Security, 70, 618. DOI: https://doi.org/10.1016/j.cose.2017.08.003
Gupta & Quamara, M. (2018). An identity-based access control and mutual authentication framework for distributed cloud computing in the Internet of Things environment. ICCIDS Procedia Computer Science, 189-197. DOI: https://doi.org/10.1016/j.procs.2018.05.185
Gutlapalli, S. S. (2017). The Role of Deep Learning in the Fourth Industrial Revolution: A Digital Transformation Approach. Asian Accounting and Auditing Advancement, 8(1), 52–56. Retrieved from https://4ajournal.com/article/view/77
Gutlapalli, S. S., Mandapuram, M., Reddy, M., & Bodepudi, A. (2019). Evaluation of Hospital Information Systems (HIS) in terms of their Suitability for Tasks. Malaysian Journal of Medical and Biological Research, 6(2), 143–150. https://doi.org/10.18034/mjmbr.v6i2.661 DOI: https://doi.org/10.18034/mjmbr.v6i2.661
Jiang, X. C., & Zheng, J. D. (2014). An Indirect Fingerprint Authentication Scheme in Cloud Computing. Applied Mechanics and Materials, 484-485, 986-990. https://doi.org/10.4028/www.scientific.net/AMM.484-485.986 DOI: https://doi.org/10.4028/www.scientific.net/AMM.484-485.986
Juels, A. and Sudan, M. (2002). A fuzzy vault scheme. In Proc. IEEE Int. Symp. Inform. Theroy, Lausanne, Switzerland, p. 408. DOI: https://doi.org/10.1109/ISIT.2002.1023680
Kalangi, R. R., & Rao, M. V. P. C. (2018). A novel multi-user fingerprint minutiae-based encryption and integrity verification for cloud data. International Journal of Advanced Computer Research, 8(37), 161-170. https://doi.org/10.19101/IJACR2018.837010 DOI: https://doi.org/10.19101/IJACR.2018.837010
Mandapuram, M. (2017). Application of Artificial Intelligence in Contemporary Business: An Analysis for Content Management System Optimization. Asian Business Review, 7(3), 117–122. https://doi.org/10.18034/abr.v7i3.650 DOI: https://doi.org/10.18034/abr.v7i3.650
Mandapuram, M., & Hosen, M. F. (2018). The Object-Oriented Database Management System versus the Relational Database Management System: A Comparison. Global Disclosure of Economics and Business, 7(2), 89–96. https://doi.org/10.18034/gdeb.v7i2.657 DOI: https://doi.org/10.18034/gdeb.v7i2.657
Mandapuram, M., Gutlapalli, S. S., Bodepudi, A., & Reddy, M. (2018). Investigating the Prospects of Generative Artificial Intelligence. Asian Journal of Humanity, Art and Literature, 5(2), 167–174. https://doi.org/10.18034/ajhal.v5i2.659 DOI: https://doi.org/10.18034/ajhal.v5i2.659
Pang, X., Song, Z., & Xie, W. (2013). Extracting Valley-Ridge Lines from Point-Cloud-Based 3D Fingerprint Models. IEEE Computer Graphics and Applications, 33(4), 73-81. https://doi.org/10.1109/MCG.2012.128
Pang, X., Song, Z., & Xie, W. (2013). Extracting valley-ridge lines from point-cloud-based 3D fingerprint models. IEEE Computer Graphics and Applications, 33(4), 73-81. https://doi.org/10.1109/MCG.2012.128 DOI: https://doi.org/10.1109/MCG.2012.128
Rajarajan, S., Kausik, R., Charan, M., & PLK. Priyadarsini. (2019). Privacy-Preserving Fingerprint Authentication at the Cloud Server for eHealth Services. EAI Endorsed Transactions on Pervasive Health and Technology, 5(18). https://doi.org/10.4108/eai.13-7-2018.162688 DOI: https://doi.org/10.4108/eai.13-7-2018.162688
Reddy, M., Bodepudi, A., Mandapuram, M., & Gutlapalli, S. S. (2020). Face Detection and Recognition Techniques through the Cloud Network: An Exploratory Study. ABC Journal of Advanced Research, 9(2), 103–114. https://doi.org/10.18034/abcjar.v9i2.660 DOI: https://doi.org/10.18034/abcjar.v9i2.660
Sabeetha, S. S., & Malarvizhi, N. (2021). Distributed deduplication with fingerprint index management model for big data storage in the cloud. Evolutionary Intelligence, 14(2), 683-690. https://doi.org/10.1007/s12065-020-00395-8 DOI: https://doi.org/10.1007/s12065-020-00395-8
Shi, S., Cui, J., Xin-Li, Z., Liu, Y., Jing-Liang, G., & Yun-Jiang, W. (2019). Fingerprint Recognition Strategies Based on a Fuzzy Commitment for Cloud-Assisted IoT: A Minutiae-Based Sector Coding Approach. IEEE Access, 7, 44803-44812. https://doi.org/10.1109/ACCESS.2019.2906265 DOI: https://doi.org/10.1109/ACCESS.2019.2906265
Tang, Y., Zhang, Y., & Zhang, N. (2015). Cloud Security Certification Technology Based on Fingerprint Recognition, Telecommunications Science, 31(8).
Thodupunori, S. R., & Gutlapalli, S. S. (2018). Overview of LeOra Software: A Statistical Tool for Decision Makers. 技术与管理回顾, 1(1), 7–11. http://技术与管理回顾.移动/index.php/tmr/article/view/4
Wu, H., Fan, J., Liu, J., & Zhang, J. (2014). Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm. Telecommunications Science, 30(11), 110-115. https://doi.org/10.3969/j.issn.1000-0801.2014.11.019 DOI: https://doi.org/10.1016/j.diin.2014.02.002
Yang, J., Xiong, N., Vasilakos, A. V., Fang, Z., Park, D., Xu, X., Yoon, S., Xie, S., & Yang, Y. (2011). A Fingerprint Recognition Scheme Based on Assembling Invariant Moments for Cloud Computing Communications. IEEE Systems Journal, 5(4), 574-583. https://doi.org/10.1109/JSYST.2011.2165600 DOI: https://doi.org/10.1109/JSYST.2011.2165600
Yassin, A. A. (2014). Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing. International Scholarly Research Notices, 2014. https://doi.org/10.1155/2014/351696 DOI: https://doi.org/10.1155/2014/351696
Zhang, X. (2013). Design of Cloud Security Login System Based on Fingerprint Recognition, Dianshi Jishu (Video Engineering), 37(13), 166-171.
Zhang, X. (2013). Design of Cloud Security Login System Based on Fingerprint Recognition. Dianshi Jishu (Video Engineering), 37(13), 166-171.
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Anusha Bodepudi, Manjunath Reddy, Sai Srujan Gutlapalli, Mounika Mandapuram
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
American Journal of Trade and Policy is an Open Access journal. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal the right of first publication with the work simultaneously licensed under a CC BY-NC 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of their work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal. We require authors to inform us of any instances of re-publication.