A Secure Remote Biometric Based Finger Print for Distributed Mobile Cloud Computing Environment

Authors

  • A. Abisha  PG Scholar, Ponjesly College of Engineering, Nagercoil, Tamil Nadu, India
  • Mrs. C. Felsy  Assistant Professor, Ponjesly College of Engineering, Nagercoil, Tamil Nadu, India
  • Mrs. M. L. Sworna Kokila  Associate Professor, Ponjesly College of Engineering, Nagercoil, Tamil Nadu, India
  • Mrs. M. Manchu  Associate Professor, Ponjesly College of Engineering, Nagercoil, Tamil Nadu, India

Keywords:

Abstract

Identity based Mutual Authentication and Key Agreement (ID-MAKA) between a versatile client and cloud benefit supplier is vital for getting to any cloud administrations. In later a long time, there are a huge number of ID-MAKA plans had been proposed on versatile cloud computing administrations to form confirmation and getting to prepare more ease of use, security, and adaptability. To a modern ID-MAKA plot for versatile cloud computing, which firstly accomplishes farther biometric based verification (inaccessible servers confirm user’s biometrics), single sign-on (a single credential and single enrollment for getting to numerous servers) and center-less verification (the registration center does not take part within the get to method) in one plot. In arrange to realize this target, to plan a ZK token based on ECC and cryptographic hash work, and after that shrewdly utilize it to present the fuzzy extractor innovation and zero-knowledge innovation into our plot. Hence, the client can get to different cloud computing servers by enrolling as it were once within the enrollment center, and cloud computing servers can total the biometric-based inaccessible verification and key assention for the client without the enrollment center taking part. In this way, the conspire significantly makes strides ease of use, adaptability, and security compared to other existing arrangements. To provide a formal security verification for our plot by utilizing Real-Or-Random (RoR) demonstrate and Burrows Abadi Needham (Boycott) rationale to appear that the display conspire is secure and security investigation for other known assaults. At long last, agreeing to the explore result, the plot has lower computation and communication fetched compared with most existing related plans.

References

  1. Aad van Moorsel.Amjad Aldweesh Dong, . Changyu, Yilei Wang, , Patrick McCorry, and “Betrayal, Distrust, and Rationality: Smart CounterCollusion Contracts for Verifiable Cloud Computing.” In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS ’17, 211– 27. Dallas, Texas, USA: ACM Press, 2017.
  2. Abdalla M , Fouque P A , Pointcheval D. "Password- based authenticated key exchange in the threeparty setting,[C] "// International Conference on Theory & Practice in Public Key Cryptography. Springer-Verlag, 2005
  3. Adrijit Goswami, Ashok Kumar Das, Odelu and Vanga “A Secure BiometricsBased Multi-Server Authentication Protocol Using Smart Cards.” IEEE Transactions on Information Forensics and Security 10, no. 9 (September 2015): 1953–66. https://doi.org/10.1109/TIFS .
  4. Ashok Kumar Das, Neeraj Kumar,. “Secure Three- Factor User Authentication Scheme for Renewable- Energy-Based Smart Grid Environment.” IEEE Transactions on Industrial Informatics 13, no. 6 (December 2017): 3144–53.
  5. Athanasios V Wazid, Mohammad Mauro Conti, and. Vasilakos. “A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.” IEEE Journal of Biomedical and Health Informatics 22, no. 4 (July 2018): 1299–1309.
  6. Debiao , and D. Wang. "Robust Biometrics-Based Authentication Scheme for Multiserver Environment." IEEE Systems Journal 9.3(2015):816-823.
  7. Dodis, , L. Reyzin , Smith,A, and Yevgeniy . "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data." International Conference on the Theory and Applications of Cryptographic Techniques Springer, Berlin, Heidelberg, 2004
  8. Eun Jun,Yoon, and K. Y. Yoo. "Robust biometrics- based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem." Journal of Supercomputing 63.1(2013):235-255.
  9. Gao.C, He.D, ShenH, and Wu. L "New biometrics- based authentication scheme for multi-server environment in critical systems." Journal of Ambient Intelligence and Humanized Computing 6.6(2015):825- 834,2015.
  10. Jia-Lun, Nai-Wei and Tsai, Lo. “A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.” IEEE Systems Journal 9, no. 3 (September 2015): 805–15.

Downloads

Published

2021-04-10

Issue

Section

Research Articles

How to Cite

[1]
A. Abisha, Mrs. C. Felsy, Mrs. M. L. Sworna Kokila, Mrs. M. Manchu, " A Secure Remote Biometric Based Finger Print for Distributed Mobile Cloud Computing Environment, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 1, pp.330-339, March-April-2021.