Open Access Open Access  Restricted Access Subscription or Fee Access

Design of Secure Biometric-Based Access Mechanism for Cloud Services

K Vijay, K. Nagaraju, Y. Chetan

Abstract


In our data-driven society, the demand for remote information storage and computation services is increasing exponentially, as is the need for secure access to such information and services. during this project, we have a tendency to style a replacement biometric-based authentication protocol to produce secure access to an overseas (cloud) server. Within the planned approach, we have a tendency to think about biometric information of a user as a secret credentials. We have a tendency to then derive a novel identity from the user’s biometric information that is more accustomed generate the user’s non-public key. Additionally, we have a tendency to propose Associate in nursing economical approach to come up with a session key between 2 act parties victimization 2 biometric templates for a secure message transmission. In different words, there's no ought to store the user’s non-public key anyplace and therefore the session secret is generated while not sharing any previous info.  A close Real-Or Random (ROR) model-based formal security analysis, informal (non-mathematical) security analysis, and formal security verification victimization the widely accepted machine-controlled Validation of internet Security Protocols and Applications (AVISPA) tool show that the planned approach will withstand many well-known attacks against (passive/active) adversary.

Keywords


biometric, cloud services, database, Mechanism.

Full Text:

PDF

References


A. Jain, L. Hong and S. Pankanti, “Biometric identification,” Communications of the ACM, vol.

, no. 2, pp. 90–98, 2019.

R. Allen, P. Sankar and S. Prabhakar, “Fingerprint identification technology,” Biometric Systems,

pp. 22–61, 2019.

J. de Mira, H. Neto, E. Neves, et al., “Biometric-oriented Iris Identification Based on

Mathematical Morphology,” Journal of Signal Processing Systems, vol. 80, no. 2, pp. 181–195,

S. Romdhani, V. Blanz and T. Vetter, “Face identification by fitting a 3d morphable model using

linear shape and texture error functions,” in European Conference on Computer Vision, pp. 3–19,

Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A survey of key management

schemes in wireless sensor networks,” Journal of Computer Communications, vol. 30, no. 11–12,

pp. 2314–2341, 2014.

X. Du, Y. Xiao, M. Guizani, and H.H. Chen, “An effective key management scheme for

heterogeneous sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24–34, 2017.

X. Du and H.H. Chen, “Security in wireless sensor networks,” IEEE Wireless Communications

Magazine, vol. 15, no. 4, pp. 60–66, 2014.

Stack Overflow-Where Developers Learn, Share, & Build Careers

Quora-A place to share knowledge and better understand the world

Intechopen.com. (2018). [online] Available at: https://www.intechopen.com/chapters/65920.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Experimental & Applied Mechanics