Privacy preserving security using biometrics in cloud computing

被引:46
|
作者
Kumar, Santosh [1 ]
Singh, Sanjay Kumar [2 ]
Singh, Amit Kumar [3 ]
Tiwari, Shrikant [4 ]
Singh, Ravi Shankar [2 ]
机构
[1] IIIT Naya Raipur, CSE, Naya Raipur, Madhya Pradesh, India
[2] Indian Inst Technol BHU, Dept Comp Sci & Engn, Varanasi, Uttar Pradesh, India
[3] Jaypee Univ Informat Technol, Dept Comp Sci & Engn, Solan, Himachal Prades, India
[4] SSGI, Dept Comp Sci & Engn, Durg, Chattisgrah, India
关键词
Cloud computing; Security; Privacy Preservation; Face recognition; Biometrics identification; Encrypted Biometrics; Elliptical encryption; FACE-RECOGNITION; IDENTIFICATION; ISSUES;
D O I
10.1007/s11042-017-4966-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and the efficient storage provide new paradigms and approaches designed at efficiently utilization of resources through computation and many alternatives to guarantee the privacy preservation of individual user. It also ensures the integrity of stored cloud data, and processing of stored data in the various data centers. However, to provide better protection and management of sensitive information (data) are big challenge to maintain the confidentiality and integrity of data in the cloud computation. Thus, there is an urgent need for storing and processing the data in the cloud environment without any information leakage. The sensitive data require the storing and processing mechanism and techniques to assurance the privacy preservation of individual user, to maintain the data integrity, and preserve confidentiality. Face recognition has recently achieved advancements in the unobtrusive recognition of individuals to maintain the privacy-preservation in the cloud computing. This paper emphasizes on cloud security and privacy issues and provides the solution using biometric face recognition. We propose a biometrics face recognition approach for security and privacy preservation of cloud users during their access to cloud resources. The proposed approach has three steps: (1) acquisition of face images (2) preprocessing and extraction of facial feature (3) recognition of individual using encrypted biometric feature. The experimental results establish that our proposed recognition approach can ensure the privacy and security of biometrics data.
引用
收藏
页码:11017 / 11039
页数:23
相关论文
共 50 条
  • [11] Privacy preserving in cloud computing environment
    Zou, Deqing
    Xiang, Yang
    Min, Geyong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2752 - 2753
  • [12] A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS
    Yao Lin Kong Xiangwei Wu Guowei Fan Qingna Lin Chi(School of Electronics & Information Engineering
    Journal of Electronics(China), 2010, 27 (01) : 68 - 78
  • [13] Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [14] Privacy preserving model-based authentication and data security in cloud computing
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 173 - 190
  • [15] Security and privacy issues in cloud computing
    Haider Abbas
    Olaf Maennel
    Saïd Assar
    Annals of Telecommunications, 2017, 72 : 233 - 235
  • [16] Cloud Computing: Security, Privacy and Practice
    Xiang, Yang
    Di Martino, Beniamino
    Wang, Guilin
    Li, Jin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2015, 52 : 59 - 60
  • [17] Security and Privacy in Cloud Computing: A Survey
    Shankarwar, Mahesh U.
    Pawar, Ambika V.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 1 - 11
  • [18] Security and Privacy in Mobile Cloud Computing
    Suo, Hui
    Liu, Zhuohua
    Wan, Jiafu
    Zhou, Keliang
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 655 - 659
  • [19] Security and privacy issues in cloud computing
    Abbas, Haider
    Maennel, Olaf
    Assar, Said
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) : 233 - 235
  • [20] Security and Privacy Issues in Cloud Computing
    Shaikh, Asma A.
    Iyer, Kamatchi
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 1299 - 1306