Biometrics template security on cloud computing

Cloud computing is the concept of using maximum remote services through a network using various minimum resources, it provides these resources to users via internet. There are many critical problems appeared with cloud computing such as data privacy, security, and reliability etc. But we find that security is the most important between these problems. In this research paper, the proposed approach is to eliminate the concerns regarding data security using bio hash function for biometrics template security to enhance the security performance in cloud as per different perspective of cloud customers. Experiments using well know benchmark CASIA fingerprint-V5 data sets show that the obtained results proved that using Bio-hash function approach is more efficient in protecting the biometric template compared to Crypto-Biometric Authentication approach and the error rate is minimized by 25%.

[1]  Yi Mu,et al.  Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships , 2010, FSE.

[2]  Wenjie Fu,et al.  Fingerprint minutiae extraction based on principal curves , 2007, Pattern Recognit. Lett..

[3]  Aboul Ella Hassanien,et al.  A Hybrid Approach for Biometric Template Security , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[4]  Venu Govindaraju,et al.  Symmetric hash functions for secure fingerprint biometric systems , 2007, Pattern Recognit. Lett..

[5]  Aboul Ella Hassanien,et al.  A Symmetric Bio-Hash Function Based on Fingerprint Minutiae and Principal Curves Approach , 2011 .

[6]  Peter Peer,et al.  Building Cloud-based Biometric Services , 2013, Informatica.

[7]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Ping Wang,et al.  A New Fingerprint Authentication Scheme Based on Secret-Splitting for Enhanced Cloud Security , 2012 .

[9]  David Zhang,et al.  An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing , 2005, KES.

[10]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[11]  Konstantinos N. Plataniotis,et al.  A Comparative Survey on Biometric Identity Authentication Techniques Based on Neural Networks , 2010 .

[12]  Thinn Thu Naing,et al.  PC-Cluster based Storage System Architecture for Cloud Storage , 2011, CloudCom 2011.

[13]  Ashis Saklani,et al.  Role of Biometric Cryptography in Cloud Computing , 2013 .

[14]  Shailendra Singh,et al.  A Survey of Cryptographic Algorithms for Cloud Computing , 2013 .

[15]  Borko Furht,et al.  Handbook of Cloud Computing , 2010 .

[16]  Akira Hirose,et al.  IEEE Press Series on Computational Intelligence , 2013 .

[17]  Srinivasulu Asadi,et al.  High Secure Crypto Biometric Authentication Protocol , 2011 .

[18]  Zhang Jun An Overview of Principal Curves , 2003 .