Biometrics-Based Un-Locker to Enhance Cloud Security Systems

Biometrics-Based Un-Locker to Enhance Cloud Security Systems

Ashima Narang, Deepali Gupta, Amandeep Kaur
Copyright: © 2020 |Pages: 12
DOI: 10.4018/IJCAC.2020100101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With the increasing demand for cloud computing, its challenges are also increasing, and security is one of the preeminent concerns. A number of approaches were introduced earlier to secure cloud storage systems, but many of them failed to provide security effectively and even emanate the concern of cost. Efficiency and cost are the essential features for any cloud system and demand for a security mechanism. To accomplish this objective, a novel feature is introduced with a concept of biometric authentication and named as ‘biometric-based un-locker'. Biometrics entities are unique in nature, so it will be the best and most cost-effective solution for the cloud. The performance of this proposed system is analyzed by generating a cloud environment and implementing it using the .NET framework on five different datasets. The results are calculated with both attackers and normal users, and performance is analyzed on the basis of time, size of data after encryption, and authentication rate. Results show that the proposed system effectively provides security and is also very cost-efficient.
Article Preview
Top

Security In Cloud Based Systems

Clouds are cost-efficient and flexible in nature and all the information is geographically distributed over the network and everything is directly controlled by Cloud. To provide security to the user’s data is the most challenging task because resources are vulnerable to theft, harm, or compromise. So, the chances of leaking information are increases and it can only be protected by ensuring security.

Subashini and Kavitha (2011) defined that a number of organizations enjoys a lot of benefits after adopting cloud computing but now-a-days the barrier in the way of technology are noticed and these are security issues and it belongs only to the serviced providers as its only their responsibility to handle data, managing data and secure data by providing it protection. To provide security to the cloud architecture and prevent data loss and manipulation, a new system is implemented on cloud storage and use of data as discussed by Waseem et al. (2016). They also discussed that the cloud environment with secure architecture will results in the reduction of the damage on physical devices as well. The other importance of security is the significant changes in the Cost and improve the performance by reducing damage to data, hardware, and software depicted by Khorshed et al. (2012).

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing