Role of Biometric Cryptography in Cloud Computing

  • Tiwari P
  • Saklani A
N/ACitations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

Cloud Computing presents a distinct way to share distributed resources and services with the help of internet. Cloud computing includes sharing of distributed resources via internet-an open network, therefore security becomes an essential issue. A secure data transmission and key management is needed in cloud computing, to overcome such problems. Securing information is the key issue in the field of network security. Cryptography is one of the most effective way to enhance information security. Biometric cryptography is a technique which uses biometric features to encrypt the data and overcome the defects of traditional cryptography. In this paper, a biometric based encryption and decryption scheme, in which a master key is generated using whole/partial hash portion of combined sender and receiver finger print. From this master key many random keys are generated using pseudo random generator which is used as a secret key for both encryption and decryption. The pseudo random number generator may have different algorithm to generate one dimensional number from a piece of image matrix of biometry. This one dimensional number is considered as master key and remains valid for one session unless renewed. This master key and sequence number (seed value, other parameter) is sent by the sender after watermarking it in sender's fingerprint along with encrypted message. Proposed system has an advantage that no need to search public key database and security is maintained. The computational requirement and network security features are duly addressed in this paper to make a normal cloud computing platform to trusted cloud computing platform and assured a secure data transmission.

Cite

CITATION STYLE

APA

Tiwari, P., & Saklani, A. (2013). Role of Biometric Cryptography in Cloud Computing. International Journal of Computer Applications, 70(9), 34–38. https://doi.org/10.5120/11993-7874

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free