A Review of Cybersecurity and Biometric Authentication in Cloud Network
DOI:
https://doi.org/10.18034/ei.v10i1.652Keywords:
Cloud Network, Cyber Security, Privacy Preservation, Biometrics Identification, Encrypted BiometricsAbstract
Cloud computing uses few resources to give customers complete distant services via the internet. Data privacy, security, and reliability are major issues with cloud computing. Security is the biggest issue. This study discusses the biometrics framework and safe cloud computing identity management method. This paper discusses cloud computing security challenges and reviews cloud access framework approaches. It describes a novel fingerprint access-based authentication system to protect cloud services from DOS and DDoS attacks. This biometrics-based system can secure cloud services from illegal access. This study addresses cloud security and privacy via biometric face recognition. Cloud users' security and privacy are protected via biometrics recognition. This article discusses CPS and its applications, technologies, and standards. SIGNIFICANT DIFFICULTIES AND CHALLENGES ARE FOUND IN reviewing CPS security weaknesses, threats, and attacks. Presenting and analyzing current security measures and their key drawbacks. Finally, this extensive examination yields various recommendations.
Downloads
References
Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2019). Voice Recognition Systems in the Cloud Networks: Has It Reached Its Full Potential? Asian Journal of Applied Science and Engineering, 8(1), 51–60. https://doi.org/10.18034/ajase.v8i1.12 DOI: https://doi.org/10.18034/ajase.v8i1.12
Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2021). Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing. American Journal of Trade and Policy, 8(3), 231–238. https://doi.org/10.18034/ajtp.v8i3.651 DOI: https://doi.org/10.18034/ajtp.v8i3.651
Gunzel, J. A. (2017). TACKLING THE CYBER THREAT: THE IMPACT OF THE DOD'S "NETWORK PENETRATION REPORTING AND CONTRACTING FOR CLOUD SERVICES" RULE ON DOD CONTRACTOR CYBERSECURITY, Public Contract Law Journal, 46(3), 687-712.
Gutlapalli, S. S. (2017). The Role of Deep Learning in the Fourth Industrial Revolution: A Digital Transformation Approach. Asian Accounting and Auditing Advancement, 8(1), 52–56. Retrieved from https://4ajournal.com/article/view/77
Gutlapalli, S. S., Mandapuram, M., Reddy, M., & Bodepudi, A. (2019). Evaluation of Hospital Information Systems (HIS) regarding their Suitability for Tasks. Malaysian Journal of Medical and Biological Research, 6(2), 143–150. https://doi.org/10.18034/mjmbr.v6i2.661 DOI: https://doi.org/10.18034/mjmbr.v6i2.661
Kumar, S., Singh, S. K., Singh, A. K., Tiwari, S., & Ravi, S. S. (2018). Privacy-preserving security using biometrics in cloud computing. Multimedia Tools and Applications, 77(9), 11017-11039. https://doi.org/10.1007/s11042-017-4966-5 DOI: https://doi.org/10.1007/s11042-017-4966-5
Malathi, R., and Raj, R. JR. (2016). An integrated approach of physical biometric authentication system. Procedia Computer Science, 85, 820-826 DOI: https://doi.org/10.1016/j.procs.2016.05.271
Mandapuram, M. (2016). Applications of Blockchain and Distributed Ledger Technology (DLT) in Commercial Settings. Asian Accounting and Auditing Advancement, 7(1), 50–57. Retrieved from https://4ajournal.com/article/view/76
Mandapuram, M., Gutlapalli, S. S., Bodepudi, A., & Reddy, M. (2018). Investigating the Prospects of Generative Artificial Intelligence. Asian Journal of Humanity, Art and Literature, 5(2), 167–174. https://doi.org/10.18034/ajhal.v5i2.659 DOI: https://doi.org/10.18034/ajhal.v5i2.659
Masala, G.L., Ruiu, P., Grosso, E. (2018). Biometric Authentication and Data Security in Cloud Computing. In: Daimi, K. (eds) Computer and Network Security Essentials. Springer, Cham. https://doi.org/10.1007/978-3-319-58424-9_19 DOI: https://doi.org/10.1007/978-3-319-58424-9_19
Obergrusberger, F., Baloglu, B., Sänger, J., Senk, C. (2012). Biometric identity trust: toward secure biometric enrollment in web environments. In: International Conference on Cloud Computing. Springer. 124-133. DOI: https://doi.org/10.1007/978-3-319-03874-2_13
Patel, A. R. (2020). Biometrics-based access framework for secure cloud computing. 2020 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 1318-1321, https://doi.org/10.1109/CSCI51800.2020.00246 DOI: https://doi.org/10.1109/CSCI51800.2020.00246
Reddy, M., Bodepudi, A., Mandapuram, M., & Gutlapalli, S. S. (2020). Face Detection and Recognition Techniques through the Cloud Network: An Exploratory Study. ABC Journal of Advanced Research, 9(2), 103–114. https://doi.org/10.18034/abcjar.v9i2.660 DOI: https://doi.org/10.18034/abcjar.v9i2.660
Sabri, H. M., Ghany, K. K. A., Hefny, H. A. and Elkhameesy, N. (2014). Biometrics template security on cloud computing. 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Delhi, India, 672-676. https://doi.org/10.1109/ICACCI.2014.6968607 DOI: https://doi.org/10.1109/ICACCI.2014.6968607
Tahir, H., and Tahir, R. (2008). Biofim: Multifactor authentication for defeating vehicle theft. In: Proceedings of the world congress on Engineering, London, UK.
Vinoth, K. M., Venkatachalam, K., Prabu, P., Almutairi, A., & Abouhawwash, M. (2021). Secure biometric authentication with de-duplication on distributed cloud storage. PeerJ Computer Science, https://doi.org/10.7717/peerj-cs.569 DOI: https://doi.org/10.7717/peerj-cs.569
Yaacoub, J. A., Salman, O., Noura, H. N., Kaaniche, N., Chehab, A., & Malli, M. (2020). Cyber-physical systems security: Limitations, issues, and future trends. Microprocessors and Microsystems, 77, 103201. https://doi.org/10.1016/j.micpro.2020.103201 DOI: https://doi.org/10.1016/j.micpro.2020.103201
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Manjunath Reddy, Nur Mohammad Ali Chisty, Anusha Bodepudi
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Engineering International is an Open Access journal. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal the right of first publication with the work simultaneously licensed under a CC BY-NC 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of their work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal. We require authors to inform us of any instances of re-publication.