A Review of Cybersecurity and Biometric Authentication in Cloud Network

Authors

  • Manjunath Reddy Customer Engineering Lead, Qualcomm, San Diego, CA, USA
  • Nur Mohammad Ali Chisty Additional Superintendent of Police (Cyber Crime Wing), Anti-Terrorism Unit, Bangladesh Police, Dhaka, BANGLADESH
  • Anusha Bodepudi Staff Engineer, Intuit, Plano, TX, USA

DOI:

https://doi.org/10.18034/ei.v10i1.652

Keywords:

Cloud Network, Cyber Security, Privacy Preservation, Biometrics Identification, Encrypted Biometrics

Abstract

Cloud computing uses few resources to give customers complete distant services via the internet. Data privacy, security, and reliability are major issues with cloud computing. Security is the biggest issue. This study discusses the biometrics framework and safe cloud computing identity management method. This paper discusses cloud computing security challenges and reviews cloud access framework approaches. It describes a novel fingerprint access-based authentication system to protect cloud services from DOS and DDoS attacks. This biometrics-based system can secure cloud services from illegal access. This study addresses cloud security and privacy via biometric face recognition. Cloud users' security and privacy are protected via biometrics recognition. This article discusses CPS and its applications, technologies, and standards. SIGNIFICANT DIFFICULTIES AND CHALLENGES ARE FOUND IN reviewing CPS security weaknesses, threats, and attacks. Presenting and analyzing current security measures and their key drawbacks. Finally, this extensive examination yields various recommendations.

Downloads

Download data is not yet available.

References

Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2019). Voice Recognition Systems in the Cloud Networks: Has It Reached Its Full Potential? Asian Journal of Applied Science and Engineering, 8(1), 51–60. https://doi.org/10.18034/ajase.v8i1.12 DOI: https://doi.org/10.18034/ajase.v8i1.12

Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2021). Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing. American Journal of Trade and Policy, 8(3), 231–238. https://doi.org/10.18034/ajtp.v8i3.651 DOI: https://doi.org/10.18034/ajtp.v8i3.651

Gunzel, J. A. (2017). TACKLING THE CYBER THREAT: THE IMPACT OF THE DOD'S "NETWORK PENETRATION REPORTING AND CONTRACTING FOR CLOUD SERVICES" RULE ON DOD CONTRACTOR CYBERSECURITY, Public Contract Law Journal, 46(3), 687-712.

Gutlapalli, S. S. (2017). The Role of Deep Learning in the Fourth Industrial Revolution: A Digital Transformation Approach. Asian Accounting and Auditing Advancement, 8(1), 52–56. Retrieved from https://4ajournal.com/article/view/77

Gutlapalli, S. S., Mandapuram, M., Reddy, M., & Bodepudi, A. (2019). Evaluation of Hospital Information Systems (HIS) regarding their Suitability for Tasks. Malaysian Journal of Medical and Biological Research, 6(2), 143–150. https://doi.org/10.18034/mjmbr.v6i2.661 DOI: https://doi.org/10.18034/mjmbr.v6i2.661

Kumar, S., Singh, S. K., Singh, A. K., Tiwari, S., & Ravi, S. S. (2018). Privacy-preserving security using biometrics in cloud computing. Multimedia Tools and Applications, 77(9), 11017-11039. https://doi.org/10.1007/s11042-017-4966-5 DOI: https://doi.org/10.1007/s11042-017-4966-5

Malathi, R., and Raj, R. JR. (2016). An integrated approach of physical biometric authentication system. Procedia Computer Science, 85, 820-826 DOI: https://doi.org/10.1016/j.procs.2016.05.271

Mandapuram, M. (2016). Applications of Blockchain and Distributed Ledger Technology (DLT) in Commercial Settings. Asian Accounting and Auditing Advancement, 7(1), 50–57. Retrieved from https://4ajournal.com/article/view/76

Mandapuram, M., Gutlapalli, S. S., Bodepudi, A., & Reddy, M. (2018). Investigating the Prospects of Generative Artificial Intelligence. Asian Journal of Humanity, Art and Literature, 5(2), 167–174. https://doi.org/10.18034/ajhal.v5i2.659 DOI: https://doi.org/10.18034/ajhal.v5i2.659

Masala, G.L., Ruiu, P., Grosso, E. (2018). Biometric Authentication and Data Security in Cloud Computing. In: Daimi, K. (eds) Computer and Network Security Essentials. Springer, Cham. https://doi.org/10.1007/978-3-319-58424-9_19 DOI: https://doi.org/10.1007/978-3-319-58424-9_19

Obergrusberger, F., Baloglu, B., Sänger, J., Senk, C. (2012). Biometric identity trust: toward secure biometric enrollment in web environments. In: International Conference on Cloud Computing. Springer. 124-133. DOI: https://doi.org/10.1007/978-3-319-03874-2_13

Patel, A. R. (2020). Biometrics-based access framework for secure cloud computing. 2020 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 1318-1321, https://doi.org/10.1109/CSCI51800.2020.00246 DOI: https://doi.org/10.1109/CSCI51800.2020.00246

Reddy, M., Bodepudi, A., Mandapuram, M., & Gutlapalli, S. S. (2020). Face Detection and Recognition Techniques through the Cloud Network: An Exploratory Study. ABC Journal of Advanced Research, 9(2), 103–114. https://doi.org/10.18034/abcjar.v9i2.660 DOI: https://doi.org/10.18034/abcjar.v9i2.660

Sabri, H. M., Ghany, K. K. A., Hefny, H. A. and Elkhameesy, N. (2014). Biometrics template security on cloud computing. 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Delhi, India, 672-676. https://doi.org/10.1109/ICACCI.2014.6968607 DOI: https://doi.org/10.1109/ICACCI.2014.6968607

Tahir, H., and Tahir, R. (2008). Biofim: Multifactor authentication for defeating vehicle theft. In: Proceedings of the world congress on Engineering, London, UK.

Vinoth, K. M., Venkatachalam, K., Prabu, P., Almutairi, A., & Abouhawwash, M. (2021). Secure biometric authentication with de-duplication on distributed cloud storage. PeerJ Computer Science, https://doi.org/10.7717/peerj-cs.569 DOI: https://doi.org/10.7717/peerj-cs.569

Yaacoub, J. A., Salman, O., Noura, H. N., Kaaniche, N., Chehab, A., & Malli, M. (2020). Cyber-physical systems security: Limitations, issues, and future trends. Microprocessors and Microsystems, 77, 103201. https://doi.org/10.1016/j.micpro.2020.103201 DOI: https://doi.org/10.1016/j.micpro.2020.103201

Downloads

Published

2022-05-30

Issue

Section

Peer Reviewed Articles

How to Cite

Reddy, M., Chisty, N. M. A., & Bodepudi, A. (2022). A Review of Cybersecurity and Biometric Authentication in Cloud Network. Engineering International, 10(1), 9-18. https://doi.org/10.18034/ei.v10i1.652

Similar Articles

1-10 of 43

You may also start an advanced similarity search for this article.