A secure framework for enhancing user authentication in cloud environment using Biometrics

被引:0
|
作者
Kathrine, G. Jaspher Willsie [1 ]
机构
[1] Karunya Univ, Madras, Tamil Nadu, India
关键词
Cloud; secure; user authentication; cryptographic algorithm; replay attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud is a ubiquitous computing technology dependent on geographically distributed computing entities like storage servers, dedicated systems and softwares. A cloud environment has dedicated systems, servers to provide the service promised by the service providers. As cloud computing is gaining more popularity, more importance is given to security issues such as, authentication, access control, storage, storage security and virtualization. Secure user authentication is one of the main necessities of cloud computing in order to avoid loss for a cloud service provider and to provide secure service to the valid user. A secure biometric based authentication scheme is proposed which provides secure user identification, mutual authentication, session key issue and proxy issue in cases where a single cloud service provider (SP) provides more than one service. Cryptographic algorithm such as Elliptic Curve Cryptography is used for secure key generation and exchange. Freshness is added in the proposed scheme to resist against replay attack. The proposed scheme has optimal communication and computation cost.
引用
收藏
页码:283 / 287
页数:5
相关论文
共 50 条
  • [31] Multimodal Biometrics for User Authentication
    Parkavi, R.
    Babu, K. R. Chandeesh
    Kumar, J. Ajeeth
    PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 501 - 505
  • [32] Secure User Authentication Using Honeywords
    Palaniappan, S.
    Parthipan, V
    Kirubakaran, S. Stewart
    Johnson, R.
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 896 - 903
  • [33] Enhancement of user authentication using biometrics in mobile networks
    Kim, Hyunseok
    2024 11TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN, ICCE-TAIWAN 2024, 2024, : 169 - 170
  • [34] SECURE CLOUD AUTHENTICATION USING EIDS
    Zwattendorfer, Bernd
    Tauber, Arne
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 397 - 401
  • [35] Secure and Privacy Enhanced Authentication Framework for Cloud Computing
    Patel, Subhash Chandra
    Singh, Ravi Shankar
    Jaiswal, Sumit
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1631 - 1634
  • [36] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [37] A Secure Mobile Authentication Alternative to Biometrics
    Azimpourkivi, Mozhgan
    Topkara, Umut
    Carbunar, Bogdan
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 28 - 41
  • [38] Analysis and Improvement of User Authentication Framework for Cloud Computing
    Chen, Nan
    Jiang, Rui
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 226 - 229
  • [39] Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics
    Wang, Yuhua
    Wu, Chunhua
    Zheng, Kangfeng
    Wang, Xiujuan
    IEEE ACCESS, 2019, 7 : 26218 - 26228
  • [40] SmileAuth: Using Dental Edge Biometrics for User Authentication on Smartphones
    Jiang, Hongbo
    Cao, Hangcheng
    Liu, Daibo
    Xiong, Jie
    Cao, Zhichao
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2020, 4 (03):