Privacy preserving security using biometrics in cloud computing

被引:46
|
作者
Kumar, Santosh [1 ]
Singh, Sanjay Kumar [2 ]
Singh, Amit Kumar [3 ]
Tiwari, Shrikant [4 ]
Singh, Ravi Shankar [2 ]
机构
[1] IIIT Naya Raipur, CSE, Naya Raipur, Madhya Pradesh, India
[2] Indian Inst Technol BHU, Dept Comp Sci & Engn, Varanasi, Uttar Pradesh, India
[3] Jaypee Univ Informat Technol, Dept Comp Sci & Engn, Solan, Himachal Prades, India
[4] SSGI, Dept Comp Sci & Engn, Durg, Chattisgrah, India
关键词
Cloud computing; Security; Privacy Preservation; Face recognition; Biometrics identification; Encrypted Biometrics; Elliptical encryption; FACE-RECOGNITION; IDENTIFICATION; ISSUES;
D O I
10.1007/s11042-017-4966-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and the efficient storage provide new paradigms and approaches designed at efficiently utilization of resources through computation and many alternatives to guarantee the privacy preservation of individual user. It also ensures the integrity of stored cloud data, and processing of stored data in the various data centers. However, to provide better protection and management of sensitive information (data) are big challenge to maintain the confidentiality and integrity of data in the cloud computation. Thus, there is an urgent need for storing and processing the data in the cloud environment without any information leakage. The sensitive data require the storing and processing mechanism and techniques to assurance the privacy preservation of individual user, to maintain the data integrity, and preserve confidentiality. Face recognition has recently achieved advancements in the unobtrusive recognition of individuals to maintain the privacy-preservation in the cloud computing. This paper emphasizes on cloud security and privacy issues and provides the solution using biometric face recognition. We propose a biometrics face recognition approach for security and privacy preservation of cloud users during their access to cloud resources. The proposed approach has three steps: (1) acquisition of face images (2) preprocessing and extraction of facial feature (3) recognition of individual using encrypted biometric feature. The experimental results establish that our proposed recognition approach can ensure the privacy and security of biometrics data.
引用
收藏
页码:11017 / 11039
页数:23
相关论文
共 50 条
  • [21] Security and Privacy Challenges in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [22] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [23] User Privacy and Security in Cloud Computing
    Waleed, AL-Museelem
    Li Chunlin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 341 - 352
  • [24] Security and Privacy Issues in Cloud Computing
    UbaidullahBokhari, Mohammad
    MakkiShallal, Qahtan
    Tamandani, Yahya Kord
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 896 - 900
  • [25] Privacy Preserving String Matching for Cloud Computing
    Bezawada, Bruhadeshwar
    Liu, Alex X.
    Jayaraman, Bargav
    Wang, Ann L.
    Li, Rui
    2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2015, : 609 - 618
  • [26] Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing
    Chenthara, Shekha
    Ahmed, Khandakar
    Wang, Hua
    Whittaker, Frank
    IEEE ACCESS, 2019, 7 : 74361 - 74382
  • [27] Privacy and security issues in cloud computing using idyllic approach
    Kumar P.S.
    Parthiban L.
    Jegatheeswari V.
    International Journal of Networking and Virtual Organisations, 2019, 21 (01) : 30 - 42
  • [28] Security Model for Preserving Privacy of Image in Cloud
    Mahapatra, Prasanta Kumar
    Tripathy, Alok Ranjan
    Tripathy, Alakananda
    Mishra, Biraja
    ADVANCES IN DATA SCIENCE AND MANAGEMENT, 2020, 37 : 247 - 256
  • [29] Security and Privacy Implications of Cloud Computing - Lost in the Cloud
    Tchifilionova, Vassilka
    OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 149 - 158
  • [30] FedLearnSP: Preserving Privacy and Security Using Federated Learning and Edge Computing
    Makkar, Aaisha
    Ghosh, Uttam
    Rawat, Danda B.
    Abawajy, Jemal H.
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (02) : 21 - 27