You are on page 1of 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/279916553

Comparison of biometric and non-biometric security techniques in mobile cloud


computing

Conference Paper · February 2015


DOI: 10.1109/ECS.2015.7124895

CITATIONS READS
8 419

1 author:

Deepti Theng
Raisoni Group of Institutions
29 PUBLICATIONS   111 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Cloud Computing, Cloud Computing Federation, Virtual Machine Management View project

Machine Learning Data Science View project

All content following this page was uploaded by Deepti Theng on 05 March 2018.

The user has requested enhancement of the downloaded file.


IEEE SPONSORED 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEM
(ICECS 2015)

Comparison of Biometric and Non-Biometric


Security Techniques in Mobile Cloud Computing
Nileshree R. Darve Deepti P. Theng
Department of Computer Science and Engineering (WCC) Department of Computer Science and Engineering
GHRCE GHRCE
Nagpur, India Nagpur, India
nildarve@gmail.com dipti.theng@raisoni.net

Abstract—Mobile cloud computing can be defined as the It delivers information technology services in which rather
cloud computing which can be access by mobile devices anytime than a direct connection to a server, resources are retrieved
anywhere. It is a pay as you use service. Due to the high use of from the internet through web based tools and applications
cloud services the security provisions must be there to protect [12]. It works in pay as you use manner [14]. As cloud
mobile cloud computing. The attack of unauthorized users to
computing enables users to use resources as and when they are
access the cloud services is the dangerous threat to authorized
user as well as to the computing environment. To prevent such required, mobile cloud computing provides the same services
environment there are various techniques designed some of them through mobile phones [1]. Hence we can say that Mobile
are biometric and some are non-biometric. In this research paper Cloud Computing (MCC) is a combination of the concept of
we study that various techniques proposed for securing mobile cloud computing within a mobile environment [1]. Due to this
cloud computing. functionality of mobile phones to directly access the services
from mobile, protecting mobile cloud computing from
Keywords—Biometric techniques, Fingerprint authentication, illegitimate access becomes an important concern to mobile
Mobile cloud computing, Non-biometric techniques. users [15]. It is also important to maintain privacy of the user
[16].
I. INTRODUCTION Mobile cloud computing combines the advantages of both
Cloud deals with distributed computing which processes mobile computing and cloud computing, it is one of major
data distributed by virtualized manner [13]. When cloud mobile technology trends in the future which can provide
consumer demands for the resources and computing optimal services for mobile users [11]. The concept of cloud
infrastructure, cloud provides it to the consumers [10]. computing provides new opportunity for the development of
mobile applications since it allow the mobile devices to
maintain a very thin layer for user applications and shift the
Essential computation and processing overhead to the virtual
characteristics environment [11]. With the availability of resources and
services to access the MCC from anywhere at any time the
Broad Rapid Measu On- security issues overcame. Several common problems issued by
Network Elastic red demand MCC are privacy, personal data management, identity
access ity Service Self- authentication, and potential attacks. The security issues are a
Service major hindrance in the mobile cloud computing adaptability
[1].
Resource pooling In this research the focus is on preventing MCC from
unauthorized access of services. For that we study and
overview the literature based on security of mobile cloud
Service models computing. The literature includes non-biometric and
biometric authentication methods for security of MCC.
SAAS PAAS IAAS Biometric authentication deals with identifying a user by his
physical characters like fingerprints, retina scanning, iris
scanning, and hand palm touching etc.
Deployment models The paper is organized as follows: Literature survey and
various techniques are described in section II, in section III
Publi Privat Hybri Comm proposed methodology is discussed, section IV gives the
c e d
unity conclusion.
II. LITERATURE REVIEW
In [1] security issues like data integrity, identity privacy,
Figure 1: Cloud computing overview model [12] location privacy, risk management, authentication, secure data

978-1-4788-7225-8/15/$31.00 ©2015 IEEE


213
access or secure routing are mentioned by author. The author B. Biometric Authentication:
gives different challenges in mobile cloud computing which
may become big obstacles in front of users. The author focused on the secured authentication of user in
mobile cloud computing [2]. To provide secured
authentication biometric authentication technique is used by
author. The fingerprint image is considered as a biometric
input. The mobile phone camera is used as a biometric sensor
Server and VMs to capture fingerprint image. If the captured image match with
the image stored in the database then authentication is provided
to user. It is also inexpensive to implement.
The proposed method of cloud storage identity
authentication in [3] is based on fingerprint identification and
mixed encryption to establish a secure communication. User
Interne can login to the online cloud storage system from web server.
t The authentication server provides an ID number to extract
fingerprint template from the database to match the input
fingerprint with stored one. This method increases the
efficiency of cloud storage authentication and secure data
transmission
In [5] based on retina pattern recognition an automatic
person identification algorithm is proposed. The proposed
method basically follows 3 steps. First is reference point
detection to compensate the translational and rotational
Wireless access point radio displacements, then identify blood vessel intersection points
Tower by blood vessel segmentation and finally matching the
intersection points. The algorithm acquired retina image then
processing on that image. In processing of image features of
image extracted and then matching of retina pattern is done.
Mobile Devices In [7] the biometric recognition system is proposed which
works on palmprint features of user. The system uses
Figure 2: Mobile Cloud Computing Orthogonal Line Features (OLOF) extraction technique. The
image of hand palm is taken with spread fingers. Then image
A. Non- Biometric Authentication: goes from various processing. After the preprocessing the
features of image are extracted and then matching of features
The multi-token authorization strategy is proposed in [4] with registered image is done. If matching is completed
for securing mobile cloud computing. Author studied on successfully the user is allowed to access services from cloud.
weaknesses of identity management systems (IDM). There are The biometric authentication method using fusion of ear
two major issues found, first is hackers can get authorization if and finger knuckle image is proposed in [8]. This is a
Idm is compromised through viral code. Then all the multimodal biometric recognition method which increases
communication links carries authorization token that can allow recognition rate than unimodal methods. The image-level
unauthorized attackers at any link. The solutions given for fusion and multi-level fusion algorithms are proposed where
these problems propose generating a distributed authorization image level fusion integrates different information into a new
token composed of two parts for a single resource access. First image with high quality which is useful for processing task.
token is generated by Idm and sent to the user and to the The multilevel fusion is proposed at image level and
cloud. The second token is generated by the cloud and sent to classification level. The images of ear and finger knuckle are
the user. Once user login to the cloud , cloud generates token combined and their features are extracted, these features are
and request user to generate token by Idm. User sends both classified and combine the output in multilevel fusion. In these
token and cloud compare them with token saved in database. methods no information is lost.
After this the access is granted to the user. In [9] an algorithm for biometric key generation from
The author proposed a mechanism which uses the concept fingerprint is studied by author, analyzed it, improved it and
of RSA algorithm and Hash function with different proposed a new distance based key generation algorithm for
cryptography tools to provide security to the data stored on the the same purpose. The newly given distance based key
mobile cloud [6]. The RSA algorithm is used for performing generation algorithm is simpler and reduces the complex
encryption and decryption which provides message sequence of operations to generate the crypto keys in the
authentication. Here the hash function of the message is also traditional biometric cryptosystem. In previous algorithm the
calculated to provide security to the data. key is generated from the minutiae points extracted from the
fingerprint image processing. The author found some

214
weaknesses in the algorithm and hence propose a modified Fusion Algorithm two images which results for the
version of its which can work better for biometric security. and provides better combination of
Multi-Level Fusion security than a ear and finger
Following table shows the overall advantages and Algorithm [8]. single image used knuckle but for
disadvantages of techniques used by different authors in their for authentication. other biometrics
papers described in the literature. No information is it is not so good.
lost in this
TABLE 1. Comparison of Biometric and Non-Biometric Techniques method.
Key Generation The key generation Fingerprint
Technique Advantages Disadvantages Algorithms [9]. algorithm is used authentication is
Fingerprint Fingerprint image The fingerprint for fingerprint not much secure.
recognition and used as biometric impressions of authentication.
image processing input for user can be This algorithm
[2]. authentication obtained from may results better
Fingerprint purpose provides any object which for other
identification more security than is hold by user in biometrics also.
and mixed non-biometric hands.
encryption [3]. algorithms.
Generating a It is non-biometric The III. PROPOSED METHODOLOGY
distributed authentication and communication From all the literature review of biometric and non-
authorization token token generated link in the model biometric authentication methods of securing mobile cloud
composed of two by IDM and cloud carries the
parts for a single
computing we can say that for biometric techniques most of
both are sent to complete token the authors uses fingerprint image as a biometric input. It is a
resource access [4]. the user for due to which a convenient method to provide security. But a hacker can
authentication hacker is able to obtain the fingerprint impressions of user from any object
which is more acquire the which are hold by the user in hands. Hence we propose to use
secure method. protected the eye image of the user as a biometric input for securing
resource. mobile cloud computing. Use of eye image will improves the
Retina Pattern Retina image is The number of security of authentication. The algorithm for processing the
Recognition used which is a images matched eye image is similar to algorithm for fingerprint [2] excepting
Algorithm (RPRA) unique identity of with dataset is some parameters of feature extraction and matching
[5]. any person hence not very high. algorithms.
it can provide
higher security to
the mobile cloud. IV. CONCLUSION
RSA and Hash It is a non- It provides In this paper we have presented the literature review of
Function [6]. biometric method security to the securing mobile cloud computing using biometric and non-
of authentication. messages of biometric techniques and compare those techniques used for
It provides user, but it is not authentication as security purpose. From that comparison we
encryption and applicable at the propose the biometric authentication method using eye image
decryption to the time of login to as a biometric input to improve and enhance the security of
messages of users the mobile cloud. mobile cloud computing. As it is difficult to hack or copy the
to secure them features of eye image of user, it can provide more security to
from unauthorized the authentication of mobile cloud user.
persons.
Orthogonal Line Palmprint image Like fingerprint
Ordinals Features works like impression References
(OLOF) extraction fingerprint image palmprint
[7]. and as it is a impressions can [1] Mojtaba Alizadeh, Wan Haslina Hassan,” Challenges and
biometric be obtained by Opportunities of Mobile Cloud Computing” 2013 IEEE.
authentication hackers. [2] IehabALRassan, HananAlShaher,” Securing Mobile
provides more Cloud Using Finger Print Authentication” International
security than any Journal of Network Security & Its Applications (IJNSA),
other Vol.5, No.6, November 2013.
authentication [3] Guobo Xie and 2Bingying Yao,” Cloud Storage Identity
methods. Design Based On Fingerprint Identification” 2013 6th
Image-Level It uses fusion of It gives better International Conference on Information Management,
Innovation Management and Industrial Engineering.

215
[4] Azeem Ahmad, Muhammad Mustafa Hassan, Abdul
Aziz,” A Multi-Token Authorization Strategy for Secure
Mobile Cloud Computing” 2014 2nd IEEE International
Conference on Mobile Cloud Computing, Services, and
Engineering
[5] Muhammad Nazrul Islam, Md. Amran Siddiqui and
Samiron Paul,” An Efficient Retina Pattern Recognition
Algorithm (RPRA) towards Human Identification” .
[6] Preeti Garg, Dr. Vineet Shanna,” An Efficient and Secure
Data Storage in Mobile Cloud Computing through RSA
and Hash Function” 2014 Internationai Conference on
Issues and Challenges in Intelligent Computing
Techniques (ICICT)
[7] Nuno Freire Moco, Paulo Lobato Correia, Luis ducal
soares,”Smartphone-Based Palmprint Recognition
System” 2014 21st International Conference on
Telecommunications (ICT).
[8] A. Tharwat1, Abdelhameed F. Ibrahim2, Hesham A. Ali2
,” Multimodal Biometric Authentication Algorithm Using
Ear and Finger Knuckle Images ”
[9] R Ranjan, Sanjay Kumar Singh,” Improved and
Innovative Key Generation Algorithms for Biometric
Cryptosystems” 2013 3rd IEEE International Advance
Computing Conference (IACC)
[10] Rishabh Sharma, Sanjay Kumar, Munesh Chandra
Trivedi,” Mobile Cloud Computing: A Needed Shift from
Cloud to Mobile Cloud” 2013 5th International
Conference on Computational Intelligence and
Communication Networks
[11] Dipayan Dev, Krishna Lal Baishnab,” A Review and
Research towards Mobile Cloud Computing” 2014 2nd
IEEE International Conference on Mobile Cloud
Computing, Services, and Engineering.
[12] Abir Khaldi , Kamel Karoui, Nada Tanabèn and Henda
Ben Ghezala,” A secure cloud computing architecture
design ” 2014 2nd IEEE International Conference on
Mobile Cloud Computing, Services, and Engineering
[13] Theng, D.; Hande, K.N., "VM Management for Cross-
Cloud Computing Environment," Communication
Systems and Network Technologies (CSNT), 2012
International Conference on , vol., no., pp.731,735, 11-13
May 2012
[14] Theng, D., "Efficient Computational Strategy for Cloud
Computing Environment," Emerging Research in
Computing, Information, Communication and
Applications (ERCICA), 2014 Second International
Conference on, vol., no., pp.8,17, 1-2 August 2014
[15] Gourkhede, M.H.; Theng, D.P., "Analysing Security and
Privacy Management for Cloud Computing Enviro ment,"
Communication Systems and Network Technologies
(CSNT), 2014 Fourth International Conference on , vol.,
no., pp.677,680, 7-9 April 2014
[16] Gourkhede, M.H.; Theng, D.P., "Preserving Privacy and
Illegal Content Distribution for Cloud Environment,"
International Journal of Computing and Technology
(IJCT), 2014, vol., no. 1, issue 3, pp.142,148, May 2014

216

View publication stats

You might also like