Towards biometric-based authentication for cloud computing

Kok Seng Wong, Myung Ho Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Cloud computing is an emerging technology that allows different service providers to offer services in an on-demand environment. Due to the advantages such as flexibility, mobility, and costs saving, the number of cloud user has increased tremendously. Consequently, a more secure and privacy preserving authentication system is becoming important to ensure that only the data owner or the authorized user can gain access and manipulate data stored in the cloud. In the current approach, the service provider authenticates its users based on the credential submitted such as password, token and digital certificate. Unfortunately, these credentials can often be stolen, accidentally revealed or hard to remember. In view of this, we propose a biometric-based authentication protocol, which can be used as the second factor for the cloud users to send their authentication requests. In our solution, the credential submitted by the users consists of the biometric feature vector and the verification code. For the user to successful authenticate, both the biometric feature vector and the verification code must be combined, transformed, and shuffled correctly. Our proposed solution not only provides the security mechanism for the authentication process, but also supports the privacy protection for all sensitive information of the user.

Original languageEnglish
Title of host publicationCLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science
Pages501-510
Number of pages10
Publication statusPublished - Aug 16 2012
Externally publishedYes
Event2nd International Conference on Cloud Computing and Services Science, CLOSER 2012 - Porto, Portugal
Duration: Apr 18 2012Apr 21 2012

Conference

Conference2nd International Conference on Cloud Computing and Services Science, CLOSER 2012
CountryPortugal
CityPorto
Period4/18/124/21/12

Fingerprint

Biometrics
Cloud computing
Authentication
Network protocols
Costs

Keywords

  • Biometric-based authentication
  • Cloud authentication system
  • Data protection
  • Privacy preserving squared euclidean distance

ASJC Scopus subject areas

  • Software

Cite this

Wong, K. S., & Kim, M. H. (2012). Towards biometric-based authentication for cloud computing. In CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science (pp. 501-510)

Towards biometric-based authentication for cloud computing. / Wong, Kok Seng; Kim, Myung Ho.

CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. 2012. p. 501-510.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wong, KS & Kim, MH 2012, Towards biometric-based authentication for cloud computing. in CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. pp. 501-510, 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012, Porto, Portugal, 4/18/12.
Wong KS, Kim MH. Towards biometric-based authentication for cloud computing. In CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. 2012. p. 501-510
Wong, Kok Seng ; Kim, Myung Ho. / Towards biometric-based authentication for cloud computing. CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. 2012. pp. 501-510
@inproceedings{cc82948bc0a143969580354d01e3ad77,
title = "Towards biometric-based authentication for cloud computing",
abstract = "Cloud computing is an emerging technology that allows different service providers to offer services in an on-demand environment. Due to the advantages such as flexibility, mobility, and costs saving, the number of cloud user has increased tremendously. Consequently, a more secure and privacy preserving authentication system is becoming important to ensure that only the data owner or the authorized user can gain access and manipulate data stored in the cloud. In the current approach, the service provider authenticates its users based on the credential submitted such as password, token and digital certificate. Unfortunately, these credentials can often be stolen, accidentally revealed or hard to remember. In view of this, we propose a biometric-based authentication protocol, which can be used as the second factor for the cloud users to send their authentication requests. In our solution, the credential submitted by the users consists of the biometric feature vector and the verification code. For the user to successful authenticate, both the biometric feature vector and the verification code must be combined, transformed, and shuffled correctly. Our proposed solution not only provides the security mechanism for the authentication process, but also supports the privacy protection for all sensitive information of the user.",
keywords = "Biometric-based authentication, Cloud authentication system, Data protection, Privacy preserving squared euclidean distance",
author = "Wong, {Kok Seng} and Kim, {Myung Ho}",
year = "2012",
month = "8",
day = "16",
language = "English",
isbn = "9789898565051",
pages = "501--510",
booktitle = "CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science",

}

TY - GEN

T1 - Towards biometric-based authentication for cloud computing

AU - Wong, Kok Seng

AU - Kim, Myung Ho

PY - 2012/8/16

Y1 - 2012/8/16

N2 - Cloud computing is an emerging technology that allows different service providers to offer services in an on-demand environment. Due to the advantages such as flexibility, mobility, and costs saving, the number of cloud user has increased tremendously. Consequently, a more secure and privacy preserving authentication system is becoming important to ensure that only the data owner or the authorized user can gain access and manipulate data stored in the cloud. In the current approach, the service provider authenticates its users based on the credential submitted such as password, token and digital certificate. Unfortunately, these credentials can often be stolen, accidentally revealed or hard to remember. In view of this, we propose a biometric-based authentication protocol, which can be used as the second factor for the cloud users to send their authentication requests. In our solution, the credential submitted by the users consists of the biometric feature vector and the verification code. For the user to successful authenticate, both the biometric feature vector and the verification code must be combined, transformed, and shuffled correctly. Our proposed solution not only provides the security mechanism for the authentication process, but also supports the privacy protection for all sensitive information of the user.

AB - Cloud computing is an emerging technology that allows different service providers to offer services in an on-demand environment. Due to the advantages such as flexibility, mobility, and costs saving, the number of cloud user has increased tremendously. Consequently, a more secure and privacy preserving authentication system is becoming important to ensure that only the data owner or the authorized user can gain access and manipulate data stored in the cloud. In the current approach, the service provider authenticates its users based on the credential submitted such as password, token and digital certificate. Unfortunately, these credentials can often be stolen, accidentally revealed or hard to remember. In view of this, we propose a biometric-based authentication protocol, which can be used as the second factor for the cloud users to send their authentication requests. In our solution, the credential submitted by the users consists of the biometric feature vector and the verification code. For the user to successful authenticate, both the biometric feature vector and the verification code must be combined, transformed, and shuffled correctly. Our proposed solution not only provides the security mechanism for the authentication process, but also supports the privacy protection for all sensitive information of the user.

KW - Biometric-based authentication

KW - Cloud authentication system

KW - Data protection

KW - Privacy preserving squared euclidean distance

UR - http://www.scopus.com/inward/record.url?scp=84864874939&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84864874939&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9789898565051

SP - 501

EP - 510

BT - CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science

ER -