Securing Mobile Cloud Using Finger Print Authentication

Mobile cloud computing becomes part of mobile users daily life transactions. Mobile devices with Internet capabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobile devices, these devices can't install and run applications require heavy CPU processing or extensive memory. Cloud computing allows mobile users to synchronize their data with remote storage and utilize applications require heavy CPU processing or extensive memory such as Microsoft Office or Adobe Photoshop, as they run in a desktop computer. The combination of cloud computing and mobile computing introduces mobile cloud computing, which also present new issues of security threats such as unauthorized access to resources exist in mobile cloud. Protecting mobile cloud computing from illegitimate access becomes an important concern to mobile users. This paper proposes and implements a new user authentication mechanism of mobile cloud computing using fingerprint recognition system. Fingerprint images of mobile users can be captured and processed using mobile phone camera to access mobile cloud computing . The implementation of the proposed solution in different mobile operating systems and devices show security enhancement in mobile cloud computing with accepted performance level.

[1]  Andrew Beng Jin Teoh,et al.  Preprocessing of Fingerprint Images Captured with a Digital Camera , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.

[2]  Mufajjul Ali,et al.  Can a Mobile Cloud Be More Trustworthy than a Traditional Cloud? , 2011, MobiSec.

[3]  Wei-Kuan Shih,et al.  An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing , 2011, 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering.

[4]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[5]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[6]  V. K. Agrawal,et al.  Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.

[7]  Christoph Busch,et al.  Fingerprint Recognition with Embedded Cameras on Mobile Phones , 2011, MobiSec.

[8]  Xiangdong Li,et al.  Cloud Computing: Introduction, Application and Security from Industry Perspectives , 2011 .

[9]  Andrew Beng Jin Teoh,et al.  A secure digital camera based fingerprint verification system , 2010, J. Vis. Commun. Image Represent..

[10]  Chulhan Lee,et al.  A Study of Touchless Fingerprint Recognition System , 2006, SSPR/SPR.

[11]  Andrew Beng Jin Teoh,et al.  Automatic Digital Camera Based Fingerprint Image Preprocessing , 2006, International Conference on Computer Graphics, Imaging and Visualisation (CGIV'06).

[12]  Dan Xu,et al.  Fingerprint Image Preprocessing Based on Whole-Hand Image Captured by Digital Camera , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.

[13]  Chin-Chen Chang,et al.  An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2009, Comput. Secur..

[14]  Chulhan Lee,et al.  Preprocessing of a Fingerprint Image Captured with a Mobile Camera , 2006, ICB.

[15]  Chulhan Lee,et al.  A new scheme for touchless fingerprint recognition system , 2004, Proceedings of 2004 International Symposium on Intelligent Signal Processing and Communication Systems, 2004. ISPACS 2004..

[16]  Qiaoyan Wen,et al.  Design of Security Solution to Mobile Cloud Storage , 2012 .

[17]  Raul Sánchez-Reillo,et al.  An Approach to Biometric Identity Management Using Low Cost Equipment , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[18]  Sebti Foufou,et al.  Cloud-Ready Biometric System for Mobile Security Access , 2012, NDT.

[19]  Hyotaek Lim,et al.  A Strong User Authentication Framework for Cloud Computing , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.

[20]  Dong-Sik Oh,et al.  A Study on Authentication System Using QR Code for Mobile Cloud Computing Environment , 2011 .

[21]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .