Privacy preserving security using biometrics in cloud computing

被引:46
|
作者
Kumar, Santosh [1 ]
Singh, Sanjay Kumar [2 ]
Singh, Amit Kumar [3 ]
Tiwari, Shrikant [4 ]
Singh, Ravi Shankar [2 ]
机构
[1] IIIT Naya Raipur, CSE, Naya Raipur, Madhya Pradesh, India
[2] Indian Inst Technol BHU, Dept Comp Sci & Engn, Varanasi, Uttar Pradesh, India
[3] Jaypee Univ Informat Technol, Dept Comp Sci & Engn, Solan, Himachal Prades, India
[4] SSGI, Dept Comp Sci & Engn, Durg, Chattisgrah, India
关键词
Cloud computing; Security; Privacy Preservation; Face recognition; Biometrics identification; Encrypted Biometrics; Elliptical encryption; FACE-RECOGNITION; IDENTIFICATION; ISSUES;
D O I
10.1007/s11042-017-4966-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and the efficient storage provide new paradigms and approaches designed at efficiently utilization of resources through computation and many alternatives to guarantee the privacy preservation of individual user. It also ensures the integrity of stored cloud data, and processing of stored data in the various data centers. However, to provide better protection and management of sensitive information (data) are big challenge to maintain the confidentiality and integrity of data in the cloud computation. Thus, there is an urgent need for storing and processing the data in the cloud environment without any information leakage. The sensitive data require the storing and processing mechanism and techniques to assurance the privacy preservation of individual user, to maintain the data integrity, and preserve confidentiality. Face recognition has recently achieved advancements in the unobtrusive recognition of individuals to maintain the privacy-preservation in the cloud computing. This paper emphasizes on cloud security and privacy issues and provides the solution using biometric face recognition. We propose a biometrics face recognition approach for security and privacy preservation of cloud users during their access to cloud resources. The proposed approach has three steps: (1) acquisition of face images (2) preprocessing and extraction of facial feature (3) recognition of individual using encrypted biometric feature. The experimental results establish that our proposed recognition approach can ensure the privacy and security of biometrics data.
引用
收藏
页码:11017 / 11039
页数:23
相关论文
共 50 条
  • [31] Ensuring Cloud Data Security using Public Auditing with Privacy Preserving
    Hiremath, Shivarajkumar
    Kunte, Sanjeev R.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 1100 - 1104
  • [32] Cloud-based Biometrics Processing for Privacy-Preserving Identification
    Hahn, Changhee
    Shin, Hyungjune
    Hur, Junbeom
    2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 595 - 600
  • [33] An exploration of security and privacy among cloud computing
    Chen, Chih-Yung
    Tu, Jih-Fu
    INNOVATION, COMMUNICATION AND ENGINEERING, 2014, : 219 - 222
  • [34] On Current Trends in Security and Privacy of Cloud Computing
    Sahin, Serap
    2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 171 - 175
  • [35] A Review on Privacy and Security Assessment of Cloud Computing
    Jain, Khushboo
    Gupta, Manali
    Abraham, Ajith
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (05): : 161 - 168
  • [36] A Novel Cloud Computing Algorithm of Security and Privacy
    Chen, Chih-Yung
    Tu, Jih-Fu
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [37] Security and Privacy Challenges in Vehicular Cloud Computing
    Lu, Rongxing
    Rahulamathavan, Yogachandran
    Zhu, Hui
    Xu, Chang
    Wang, Miao
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [38] SECURITY AND PRIVACY OF CONNECTED VEHICULAR CLOUD COMPUTING
    Li, Hongwei
    Lu, Rongxing
    Misic, Jelena
    Mahmoud, Mohamed
    IEEE NETWORK, 2018, 32 (03): : 4 - 6
  • [39] Security and privacy for storage and computation in cloud computing
    Wei, Lifei
    Zhu, Haojin
    Cao, Zhenfu
    Dong, Xiaolei
    Jia, Weiwei
    Chen, Yunlu
    Vasilakos, Athanasios V.
    INFORMATION SCIENCES, 2014, 258 : 371 - 386
  • [40] Cloud computing security and privacy: Standards and regulations
    Yu, Yong
    Miyaji, Atsuko
    Au, Man Ho
    Susilo, Willy
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 1 - 2