Bio-cryptographic authentication in cloud storage sharing

One of the relative recent approaches for enhancing the modern cryptosystems security is to add the biometrics layer to the existing cryptographic infrastructures. The Biometric Encryption process proposes to combine the soft biometrics with existing cryptographic keys, overcoming many of the traditional biometric systems vulnerabilities. In this paper we propose a new and novel implementation for a bio-cryptographic infrastructure, as a safer authentication mechanism for Cloud storage sharing. We talk about the architecture of our approach and we emphasize the benefits brought by combining the two fields, such as storage encryption and access control. Our implementation resides on a voice-based authentication mechanism, which confers access to the system and allows the recovery of the shared access storage encryption key.

[1]  Ann Cavoukian,et al.  Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacy , 2008 .

[2]  Mark Stamp,et al.  Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.

[3]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[4]  Victor Valeriu Patriciu,et al.  Beyond digital forensics. A cloud computing perspective over incident response and reporting , 2013, 2013 IEEE 8th International Symposium on Applied Computational Intelligence and Informatics (SACI).

[5]  Ragib Hasan,et al.  SecLaaS: secure logging-as-a-service for cloud forensics , 2013, ASIA CCS '13.

[6]  S. Karthikeyan,et al.  Securing Retina Fuzzy Vault System using Soft Biometrics , 2010 .

[7]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[8]  Mario Baum,et al.  Handbook Of Biometrics , 2016 .

[9]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[10]  NandakumarK.,et al.  Fingerprint-Based Fuzzy Vault , 2007 .