Professional Documents
Culture Documents
net/publication/279916553
CITATIONS READS
8 419
1 author:
Deepti Theng
Raisoni Group of Institutions
29 PUBLICATIONS 111 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Cloud Computing, Cloud Computing Federation, Virtual Machine Management View project
All content following this page was uploaded by Deepti Theng on 05 March 2018.
Abstract—Mobile cloud computing can be defined as the It delivers information technology services in which rather
cloud computing which can be access by mobile devices anytime than a direct connection to a server, resources are retrieved
anywhere. It is a pay as you use service. Due to the high use of from the internet through web based tools and applications
cloud services the security provisions must be there to protect [12]. It works in pay as you use manner [14]. As cloud
mobile cloud computing. The attack of unauthorized users to
computing enables users to use resources as and when they are
access the cloud services is the dangerous threat to authorized
user as well as to the computing environment. To prevent such required, mobile cloud computing provides the same services
environment there are various techniques designed some of them through mobile phones [1]. Hence we can say that Mobile
are biometric and some are non-biometric. In this research paper Cloud Computing (MCC) is a combination of the concept of
we study that various techniques proposed for securing mobile cloud computing within a mobile environment [1]. Due to this
cloud computing. functionality of mobile phones to directly access the services
from mobile, protecting mobile cloud computing from
Keywords—Biometric techniques, Fingerprint authentication, illegitimate access becomes an important concern to mobile
Mobile cloud computing, Non-biometric techniques. users [15]. It is also important to maintain privacy of the user
[16].
I. INTRODUCTION Mobile cloud computing combines the advantages of both
Cloud deals with distributed computing which processes mobile computing and cloud computing, it is one of major
data distributed by virtualized manner [13]. When cloud mobile technology trends in the future which can provide
consumer demands for the resources and computing optimal services for mobile users [11]. The concept of cloud
infrastructure, cloud provides it to the consumers [10]. computing provides new opportunity for the development of
mobile applications since it allow the mobile devices to
maintain a very thin layer for user applications and shift the
Essential computation and processing overhead to the virtual
characteristics environment [11]. With the availability of resources and
services to access the MCC from anywhere at any time the
Broad Rapid Measu On- security issues overcame. Several common problems issued by
Network Elastic red demand MCC are privacy, personal data management, identity
access ity Service Self- authentication, and potential attacks. The security issues are a
Service major hindrance in the mobile cloud computing adaptability
[1].
Resource pooling In this research the focus is on preventing MCC from
unauthorized access of services. For that we study and
overview the literature based on security of mobile cloud
Service models computing. The literature includes non-biometric and
biometric authentication methods for security of MCC.
SAAS PAAS IAAS Biometric authentication deals with identifying a user by his
physical characters like fingerprints, retina scanning, iris
scanning, and hand palm touching etc.
Deployment models The paper is organized as follows: Literature survey and
various techniques are described in section II, in section III
Publi Privat Hybri Comm proposed methodology is discussed, section IV gives the
c e d
unity conclusion.
II. LITERATURE REVIEW
In [1] security issues like data integrity, identity privacy,
Figure 1: Cloud computing overview model [12] location privacy, risk management, authentication, secure data
214
weaknesses in the algorithm and hence propose a modified Fusion Algorithm two images which results for the
version of its which can work better for biometric security. and provides better combination of
Multi-Level Fusion security than a ear and finger
Following table shows the overall advantages and Algorithm [8]. single image used knuckle but for
disadvantages of techniques used by different authors in their for authentication. other biometrics
papers described in the literature. No information is it is not so good.
lost in this
TABLE 1. Comparison of Biometric and Non-Biometric Techniques method.
Key Generation The key generation Fingerprint
Technique Advantages Disadvantages Algorithms [9]. algorithm is used authentication is
Fingerprint Fingerprint image The fingerprint for fingerprint not much secure.
recognition and used as biometric impressions of authentication.
image processing input for user can be This algorithm
[2]. authentication obtained from may results better
Fingerprint purpose provides any object which for other
identification more security than is hold by user in biometrics also.
and mixed non-biometric hands.
encryption [3]. algorithms.
Generating a It is non-biometric The III. PROPOSED METHODOLOGY
distributed authentication and communication From all the literature review of biometric and non-
authorization token token generated link in the model biometric authentication methods of securing mobile cloud
composed of two by IDM and cloud carries the
parts for a single
computing we can say that for biometric techniques most of
both are sent to complete token the authors uses fingerprint image as a biometric input. It is a
resource access [4]. the user for due to which a convenient method to provide security. But a hacker can
authentication hacker is able to obtain the fingerprint impressions of user from any object
which is more acquire the which are hold by the user in hands. Hence we propose to use
secure method. protected the eye image of the user as a biometric input for securing
resource. mobile cloud computing. Use of eye image will improves the
Retina Pattern Retina image is The number of security of authentication. The algorithm for processing the
Recognition used which is a images matched eye image is similar to algorithm for fingerprint [2] excepting
Algorithm (RPRA) unique identity of with dataset is some parameters of feature extraction and matching
[5]. any person hence not very high. algorithms.
it can provide
higher security to
the mobile cloud. IV. CONCLUSION
RSA and Hash It is a non- It provides In this paper we have presented the literature review of
Function [6]. biometric method security to the securing mobile cloud computing using biometric and non-
of authentication. messages of biometric techniques and compare those techniques used for
It provides user, but it is not authentication as security purpose. From that comparison we
encryption and applicable at the propose the biometric authentication method using eye image
decryption to the time of login to as a biometric input to improve and enhance the security of
messages of users the mobile cloud. mobile cloud computing. As it is difficult to hack or copy the
to secure them features of eye image of user, it can provide more security to
from unauthorized the authentication of mobile cloud user.
persons.
Orthogonal Line Palmprint image Like fingerprint
Ordinals Features works like impression References
(OLOF) extraction fingerprint image palmprint
[7]. and as it is a impressions can [1] Mojtaba Alizadeh, Wan Haslina Hassan,” Challenges and
biometric be obtained by Opportunities of Mobile Cloud Computing” 2013 IEEE.
authentication hackers. [2] IehabALRassan, HananAlShaher,” Securing Mobile
provides more Cloud Using Finger Print Authentication” International
security than any Journal of Network Security & Its Applications (IJNSA),
other Vol.5, No.6, November 2013.
authentication [3] Guobo Xie and 2Bingying Yao,” Cloud Storage Identity
methods. Design Based On Fingerprint Identification” 2013 6th
Image-Level It uses fusion of It gives better International Conference on Information Management,
Innovation Management and Industrial Engineering.
215
[4] Azeem Ahmad, Muhammad Mustafa Hassan, Abdul
Aziz,” A Multi-Token Authorization Strategy for Secure
Mobile Cloud Computing” 2014 2nd IEEE International
Conference on Mobile Cloud Computing, Services, and
Engineering
[5] Muhammad Nazrul Islam, Md. Amran Siddiqui and
Samiron Paul,” An Efficient Retina Pattern Recognition
Algorithm (RPRA) towards Human Identification” .
[6] Preeti Garg, Dr. Vineet Shanna,” An Efficient and Secure
Data Storage in Mobile Cloud Computing through RSA
and Hash Function” 2014 Internationai Conference on
Issues and Challenges in Intelligent Computing
Techniques (ICICT)
[7] Nuno Freire Moco, Paulo Lobato Correia, Luis ducal
soares,”Smartphone-Based Palmprint Recognition
System” 2014 21st International Conference on
Telecommunications (ICT).
[8] A. Tharwat1, Abdelhameed F. Ibrahim2, Hesham A. Ali2
,” Multimodal Biometric Authentication Algorithm Using
Ear and Finger Knuckle Images ”
[9] R Ranjan, Sanjay Kumar Singh,” Improved and
Innovative Key Generation Algorithms for Biometric
Cryptosystems” 2013 3rd IEEE International Advance
Computing Conference (IACC)
[10] Rishabh Sharma, Sanjay Kumar, Munesh Chandra
Trivedi,” Mobile Cloud Computing: A Needed Shift from
Cloud to Mobile Cloud” 2013 5th International
Conference on Computational Intelligence and
Communication Networks
[11] Dipayan Dev, Krishna Lal Baishnab,” A Review and
Research towards Mobile Cloud Computing” 2014 2nd
IEEE International Conference on Mobile Cloud
Computing, Services, and Engineering.
[12] Abir Khaldi , Kamel Karoui, Nada Tanabèn and Henda
Ben Ghezala,” A secure cloud computing architecture
design ” 2014 2nd IEEE International Conference on
Mobile Cloud Computing, Services, and Engineering
[13] Theng, D.; Hande, K.N., "VM Management for Cross-
Cloud Computing Environment," Communication
Systems and Network Technologies (CSNT), 2012
International Conference on , vol., no., pp.731,735, 11-13
May 2012
[14] Theng, D., "Efficient Computational Strategy for Cloud
Computing Environment," Emerging Research in
Computing, Information, Communication and
Applications (ERCICA), 2014 Second International
Conference on, vol., no., pp.8,17, 1-2 August 2014
[15] Gourkhede, M.H.; Theng, D.P., "Analysing Security and
Privacy Management for Cloud Computing Enviro ment,"
Communication Systems and Network Technologies
(CSNT), 2014 Fourth International Conference on , vol.,
no., pp.677,680, 7-9 April 2014
[16] Gourkhede, M.H.; Theng, D.P., "Preserving Privacy and
Illegal Content Distribution for Cloud Environment,"
International Journal of Computing and Technology
(IJCT), 2014, vol., no. 1, issue 3, pp.142,148, May 2014
216