338
Views
8
CrossRef citations to date
0
Altmetric
Articles

Improving cloud data security through hybrid verification technique based on biometrics and encryption system

ORCID Icon & ORCID Icon
Pages 455-464 | Received 22 Jun 2020, Accepted 07 Aug 2020, Published online: 24 Aug 2020

References

  • Md. Alamgir H, Jannatul F, Marjia K. A study and implementation of large-scale log-determinant computation to cloud. Int J Comput Appl. 2019;0:1–9.
  • Xiaowei Y, Xiaosong Z, Ting C, et al. The research and design of cloud computing security framework. Adv Comput Commun Control Autom. 2011;121:757–763. doi: https://doi.org/10.1007/978-3-642-25541-0_95
  • Jamil D, Zaki H. Cloud computing security. Int J Eng Sci Technol. 2011;3:3478–3483.
  • Aamir N. Cloud computing: security issues and challenges. J Wirel Commun. 2016;1:10–15.
  • Adnaan A, Thariq H. Cloud computing: study of security issues and research challenges. Int J Adv Res Comput Eng Technol. 2018;7:2278–1323.
  • Subhashini P, Yeshwanth R. Securing cloud data using encryption algorithms. Int J Adv Res Sci Eng. 2017;6:1188–1194.
  • Rohit B, Sugata S. A survey on security issues in cloud computing and associated mitigation techniques. Int J Comput Appl. 2012;47:47–66.
  • Geetanjali C, Jainul A. Modified secure two way authentication system in cloud computing using encrypted one time password. Int J Comput Sci Inform Technol. 2014;5:4077–4080.
  • Shweta M, Chander V. A hybrid approach for securing biometric template. Int J Eng Adv Technol. 2013;2:2249–8958.
  • Arun R, Anil J, James R. A hybrid fingerprint matcher. Pattern Recognit. 2002;3:795–798.
  • Yassin A. Efficiency and flexibility of fingerprint scheme using partial encryption and discrete wavelet transform to verify user in cloud computing. International Scholarly Research Notices; 2014.
  • Prakash K, Saeed Q. Implementation of security through simple symmetric key algorithm based on modulo 37. Int J Comput Technol. 2012;3:335–338. doi: https://doi.org/10.24297/ijct.v3i2c.2896
  • Hasan F. Segmentation and enhancement of low quality fingerprint images. International Conference on Web Information Systems Engineering; Vol. 10042, 2016. p. 371–382.
  • Jyoti C, Pardeep K, Mangal S, et al. A strong user authentication framework for cloud computing. Proceedings – 2011 IEEE Asia-Pacific Services Computing Conference APSCC; 2011. p. 110–115
  • Udendhran R. A hybrid approach to enhance data security in cloud storage. Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, Vol. 90, 2017. p. 1–6.
  • Selvarani P, Malarvizhi N. To enhance the data security in cloud computing using multimodal biometric system. World Wide J Multidiscip Res Dev (WWJMRD). 2017;3(7):196–201.
  • Victor S, Avi R. Session key distribution using smartcards. International Conference on the Theory and Applications of Cryptographic Techniques; Vol. 1070, 2001. p. 321–333.
  • Liao I, Lee C, Hwang M. A password authentication scheme over insecure networks. J Comput Syst Sci. 2006;72:727–740. doi: https://doi.org/10.1016/j.jcss.2005.10.001
  • Mihir B, Phillip R. Provably secure session key distribution – the three party case. Proceedings of 27th ACM Symposium on the Theory of Computing; 1995.
  • Kavita T, Renu L, Kalakot L. Fingerprint recognition and feature extraction using transform domain techniques. International Conference on Advances in Communication and Computing; 2011. p. 1–5.
  • Arockiam L, Manikandasaran SS. Efficient cloud storage confidentiality to ensure data security. International Conference on Computer Communication and Informatics; 2014. p. 1–5.
  • Rajeev Kumar B, Jaswinder S, Sunil Kumar G. An efficient and secure privacy preserving multi-cloud storage framework for mobile devices. Int J Comput Appl. 2019;0:1–11.
  • Jing S, Hongxia W, Qing Q, et al. An efficient fingerprint identification algorithm based on minutiae and invariant moment. London: Springer; 2017. p. 71–80.
  • Sahithi S, Anirudh A, Swaroop B, et al. Biometric security for cloud data using fingerprint and palm print. Int J Innov Technol Explor Eng (IJITEE). 2019;8(6S3):338–343.
  • Zarnab K, Aysha S, Maryam S, et al. Cloud server security using bio-cryptography. Int J Adv Comput Sci Appl (IJACSA). 2019;10:166–172.
  • Sree V, Chandra E. Multimodal biometric hashkey cryptography based authentication and encryption for advanced security in cloud. Biomedical Research Special. 2018
  • [Cited 2020 28 April]. How to calculate password entropy. Available from: https://ritcyberselfdefense.wordpress.com/2011/09/24/how-to-calculate-password-entropy/.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.