Open Access   Article Go Back

Cloud�s Software- Security as a Service(S-SaaS) via Biometrics

S. Shukla1 , D. Kumar2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-3 , Page no. 119-124, Mar-2014

Online published on Mar 30, 2014

Copyright © S. Shukla, D. Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Shukla, D. Kumar, “Cloud�s Software- Security as a Service(S-SaaS) via Biometrics,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.119-124, 2014.

MLA Style Citation: S. Shukla, D. Kumar "Cloud�s Software- Security as a Service(S-SaaS) via Biometrics." International Journal of Computer Sciences and Engineering 2.3 (2014): 119-124.

APA Style Citation: S. Shukla, D. Kumar, (2014). Cloud�s Software- Security as a Service(S-SaaS) via Biometrics. International Journal of Computer Sciences and Engineering, 2(3), 119-124.

BibTex Style Citation:
@article{Shukla_2014,
author = {S. Shukla, D. Kumar},
title = {Cloud�s Software- Security as a Service(S-SaaS) via Biometrics},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2014},
volume = {2},
Issue = {3},
month = {3},
year = {2014},
issn = {2347-2693},
pages = {119-124},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=82},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=82
TI - Cloud�s Software- Security as a Service(S-SaaS) via Biometrics
T2 - International Journal of Computer Sciences and Engineering
AU - S. Shukla, D. Kumar
PY - 2014
DA - 2014/03/30
PB - IJCSE, Indore, INDIA
SP - 119-124
IS - 3
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3734 3357 downloads 3670 downloads
  
  
           

Abstract

Cloud computing is considered to be the next generation of information technology framework. It is the next generation computing platforms that can provide dynamic resource pools, virtualization and high availability. The new character brings a lot of new security challenges which have not been taken into account completely in the current cloud computing system. As a consequence, to build a cloud computing data security system is the basis to build cloud computing security system. In this article, the cloud computing technology architecture and the cloud computing data security challenges are the first to be studied and considered, and then the Biometric is raised. At last, the problem definition & resolving strategy has been researched. First of all, user authentication is required to ensure that user data cannot be tampered. Users who pass the authentication can get relative operation on the user data, such as addition, modification, deletion. If the unauthorized user use illegal means to deceive the biometric authentication system, the file entered the system encrypt and privacy defense levels. If key has been got by the intruder. The user data cannot be got valid information even it is obtained through function of privacy protection. It is very important for commercial users of the cloud computing to protect their business secrets.

Key-Words / Index Term

Cloud Computing,VPN,SLA,QoS, API,Biometrics

References

[1] Hataichanok, S., Clarke, N. L., and Furnell, S. M. 2012. Multi-modal Behavioural Biometric Authentication for Mobile Devices. In Information Security and Privacy Research, pp. 465-474. Springer Berlin Heidelberg.
[2] Clarke, N. L., and Furnell S. M. 2007. Advanced user authentication for mobile devices. computers & security 26, no. 2: 109-119.
[3] Bhattacharyya, D., Rahul R., Farkhod Alisherov A., and Minkyu Ch. 2009. Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology 2, no. 3 :13-28.
[4] Crawford, H., Karen R., and Tim, S. 2013. A Framework for Continuous, Transparent Mobile Device Authentication." Computers & Security.
[5] Briggs, P., Olivier, PL. 2008. Biometric daemons: authentication via electronic pets. In: Proceedings of conference on human factors in computing systems. ACM; p. 2423e32.
[6] Kochetkov, A. 2013. Cloud-based biometric services: just a matter of time." Biometric Technology Today 2013, no. 5: 8-11.
[7] Voth, D. 2003. Face recognition technology. Intelligent Systems, IEEE 18, no. 3 (): 4-7.
[8] Fernando, N., Seng W. L., and Wenny R. 2013. Mobile cloud computing: A survey. Future Generation Computer Systems 29, no. 1 : 84-106.
[9] Wu, K., Jen-Chun L., Tsung-Ming L., Ko-Chin Ch., and Chien-Ping Ch. 2013. A secure palm vein recognition system. Journal of Systems and Software 86, no. 11: 2870-2876.
[10] Wang, Xu., Fangxia G., and Jian-feng M. 2012. User authentication via keystroke dynamics based on difference subspace and slope correlation degree. Digital Signal Processing 22, no. 5: 707-712.
[11] Gomez-Barrero, M., Javier G., and Julian F. 2013. Efficient Software Attack to Multimodal Biometric Systems and its Application to Face and Iris Fusion. Pattern Recognition Letters.
[12] Guo, J., Chih-Hsien H., Yun-Fu L., Jie-Cyun Y., Mei-Hui Ch., and Thanh-Nam L. 2012. Contact-free hand geometry-based identification system. Expert Systems with Applications 39, no. 14 : 11728-11736.
[13] Bhatt, Sh., and Santhanam, T. 2013. Keystroke dynamics for biometric authentication�A survey. In Pattern Recognition, Informatics and Medical Engineering (PRIME), International Conference on, pp. 17-23. IEEE.
[14] Araujo, L. C, Luiz, S. J., Miguel, G. L., Lee, L. L., and Jo�o B. T. Y. 2005. User authentication through typing biometrics features. Signal Processing, IEEE Transactions on 53, no. 2: 851-855.
[15] Pursani, M. P. J., and Ramteke, P. L. 2013. Mobile Cloud Computing. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2, no. 4: pp-1512.
[16] Altinkemer, K., and Tawei W. 2011. Cost and benefit analysis of authentication systems. Decision Support Systems 51, no. 3: 394-404.
[17] Khan, A. N., Mat Kiah M. L., Samee U. Kh., and Madani S. A. 2012. Towards secure mobile cloud computing: A survey. Future Generation Computer Systems.

[18] Dharamjeet Singh,Surabhi Shukla,�Cloud�s SaaS Security by Biometric Concept�;International Journal of Computer Science and Engineering 2014; Review r.
[19] www.dialogic.com/12023-cloud-computing-wp
[20] P. Syam Kumar, R. Subramanian and D. Thamizh Selvam.� Ensuring Data Storage Security in Cloud Computing using Sobol Sequence�; 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
[21] 4. NIST/SP800-144.
[22] Kaspersky Internet Security
[23] Mahnoush Babaeizadeh, Majid Bakhfiari, Mohd Aizani Maarof.�Keystroke Dynamic Authentication in Mobile Cloud Computing�;2014 International Journal of Computer Applications 2014; Volume 90- Number 1.
[24] Zirra Peter Buba, Gregory Maksha Wajiga,�Cryptographic Algoriths for Secure Data Communication�;International Journal of Computer Science and Security(IJCSS), Volume(5) :Issue(2) :2011.
[25] Hassan Takabi, James B. D. Joshi, Gail-Joon �Security and Privacy Challenges in Cloud Computing Environments�1540-7993/10/IEEE.