FINGERPRINT BASED AUTHENTICATION SYSTEM USING MERKLE HASH ALGORITHM IN CLOUD COMPUTING
SHAIK RASHEEDA BEGUM
Department of Information Technology
B.S.Abdur Rahman University
Chennai, Tamil Nadu, India
E-mail: rasheeameen@gmail.com
LATHA TAMILSELVAN
Department of Information Technology
B.S.Abdur Rahman University
Chennai, Tamil Nadu, India
E-mail: Latha.Tamilselvan94 @gmail.com
Abstract— Cloud computing has been envisioned as the next generation architecture of the IT enterprise due to its on demand self-service, ubiquitous network access, location-independent resource pooling , rapid resource elasticity and usage-based pricing . The fundamental aspect of cloud storage computing model is that data is being centralized or outsourced into the cloud without the burden of local hardware and software management thereby new and challenging threat on data arises. Fingerprint Authentication , a significant security element and popular biometric modality which is used extensively in several applications for person authentication, which provides high uniqueness and acceptable performance. In existing system the security of fingerprint data is not highly ensured . In this project A new approach of remote user fingerprint authentication scheme using the concept of Boundry Segmentation ,Spatial –Taxons , RGB Colour of Image Processing and Merkle Hash Tree has been proposed. In the data owners side, the
The thing with biometrics is that it works great only if the verifier can verify two things: Firstly, that the biometric to be used has come from the intended person at the time of verification, and Secondly, which the biometric should match with the master biometric entry in the file database. If the system can't do that, it can't work. Biometrics are good in uniquely identifying the people, butat the same time they are not secrets and cannot be trusted [1].
This research paper clearly explains the concepts of what is cloud computing and its evolution and components of clouds in which it categorizes. Models are included in the cloud computing these are also explained in the paper and also more benefits occurs in cloud computing. Security is very important when the sensitive data is lying in cloud and the risks to the cloud are enormous. The important points to be considered when a corporate organization is planning to move its data and applications to the cloud computing are Restricted user access, Regulatory compliance, Data Position, Data Separation, Recovery, Support, Long-term viability. Some Future aspects are also discussed in order to manipulate the present environment.
Thought of information deduplication was proposed to ensure the information security by including differential power of Data Owner in the copy check. In cloud server our information are safely store in scrambled format,and additionally in Key server our key is store with individual document. The presentation of a couple of beginning deduplication advancements invigorating endorsed copy duplicate in crossover cloud structural engineering, in that the copy check tokens of records are induced by the private cloud server having private keys. Security check shows that the systems are secure with respect to insider and pariah attacks point by point in the proposed security model. As an issue confirmation of origination,
Biometrics are important to not only information systems, but to information security as a subject. Today, most information is kept secure via ID cards or secret information, such as a PIN, password, pattern, etc., the downside to this type of security is the lack of a failsafe (Ashok, Shivashankar and Mudiraj)! What would happen if an ID card was lost? Or a PIN, password or pattern was leaked to individuals who were not on a “need to know” basis”? This is where the importance of biometrics comes into play.
This report started with a motivational empirical study of the usability, security, and privacy of enhanced fingerprint authentication as compared to password-based authentication. This study revealed that the password-based authentication lacks usability and security, while the privacy-enhanced fingerprint authentication is more usable than password-based authentication. However fingerprint data on the cloud poses a greater likelihood for attacks. A risk assessment was conducted to evaluate the adequacy of controls available to mitigate the risks. Based on a threshold set for the residual risk, a roadmap was established to close the gap on the lack of controls.
“SecureFinger”, some actual examples of fingerprint-based personal identification systems and large-scale fingerprint identification systems(AFIS). Fingerprint User Interface (FpUI), a new type of application of this technology used to enhance human-machine interactions will also be considered.
When a live finger is placed on the scanner at the time of authentication, the decryption process needs to be initialized. With a slit of micorseconds the fingerprint image is analyzed . The RSA key generation algorithm is performed on the fingerprint image captured and the current private key generated is crossed checked with the encrypted fingerprint images existing(Fingerprint template) if their private key matches. If the current private key generate matches witht the private key of any of the fingerprint templates, that template is decrypted by the RSA decryption algorithm witht the help of the private key. After which the M3gle fingerprint matching algorithm is used to perform further authentication of the user [8]. Below is the RSA algorithm code used for the decryption:
Biometrics is a very beneficial and quickly growing form of technology, but with that growth comes key considerations. These considerations must take into an account the security of the system itself in respect to the privacy of the user. There are several key elements and concerns that are included in this and must be highlighted during the development of the system as well as the implementation.
However, there has a problem challenge the biometric systems which use fingerprints to identify the status of people.The system is hard to
Abstract - Biometric Authentication Systems, which was once ridiculed as, a simple construct of Fiction and Sci-Fi Writers have not only penetrated our day to day life, but have grown immensely popular over the last decade with advancement in sensor technologies and efficient pattern recognition machine learning algorithms, as a strong alternative to other authentication schemes. The extent of penetration is such that, nowadays, most of us carry a version of such a system on our iPhones and Android phones, i.e. The Fingerprint Lock and the Facial Recognition Lock. These systems have become an important security aspect of our lives used for identification and verification to sensitive material. But, in todays post Snowden’s Wikileaks era, are how secure these authentication schemes are, if at all they are? And what possible privacy concerns do they beget? If there are some concerns, how do we address them? This paper talks about the aforementioned security flaws and privacy concerns followed by suggested techniques to alleviate them.
In addition, biometrics can be implemented either on the server or client side of a system. The fact that clients are remotely located challenges its implementation. This is because this type of authentication gives the client responsibility and authority for the authentication (Itakura & Tsujii, 2005). Nonetheless, efforts have been made to strengthen client side authentication such as the inclusion of error-correcting code, fuzzy concepts for behavior profiling, and key generation (Bhatnagar, Lall, & Patney, 2010).
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Cloud computing has become so famous; there is much widespread news about the cloud these days. This is mainly because of the exponential shift of the business applications from traditional models of software towards the Internet, and now through mobile devices. Cloud computing is a model that uses the network of remote servers that has been hosted on the internet rather than on a specific hardware. This would enable a better shared pool for storing, accessing and processing of data. With the huge information being available in the internet, the security for cloud computing has been challenging and this paper would elucidates the security threats of cloud computing also stating the possible countermeasures for them.
In recent years there have been heightened concerns about security due to the advancements of networking, communications, and mobility. This has led to the increase in biometrics in different applications for authentication and identification. The applications can be divided into 3 main groups Forensics, Government and Commercial (Jain, Flynn & Ross, 2008).
contain the unique extracted features of a finger. These digital fingerprint templates can be stored in databases and used in place of traditional passwords for secure access. The scanner, or reader, compares the live fingerprint to the fingerprint template stored in a database to determine the identity and validity of the person requesting access. In the proposed system, the finger print is recognized and viewed in the PC. The recognized finger print is transmitted through ZIGBEE with UART(universal asynchronous receiver and transmitter) in transmitting side. The finger print is transferred through another ZIGBEE with UART (universal asynchronous receiver and transmitter) in receiving side and viewed