Abstract
Rapid development of smart technologies enables use of cloud service for large-scale data storage. Remote access of original data as well as biometric data from cloud storage enhances several challenges. It is inevitable to prevent unauthorized access of data stored in cloud. Biometrics authentication is more efficient than the known traditional authentication mechanisms. Authentication is a major security feature used to protect data privacy, whereas additional security features used to protect data may adversely affect it. There must be a balance between security and privacy during secure authentication design. Here a survey of security and privacy issues for biometrics based remote authentication in cloud is briefly presented and the research gaps are identified to attract more research on this domain in near future.
Chapter PDF
Similar content being viewed by others
References
Tang, Q., Bringer, J., Chabanne, H., Pointcheval, D.: A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 56–70. Springer, Heidelberg (2008)
Jain, A.K., Ross, A., Pankanti, S.: Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security 1(2), 125–143 (2006)
Ignatenko, T., Willems, F.M.J.: Biometric Systems: Privacy and Secrecy As-pects. IEEE Transactions on Information Forensics and Security 4(4), 956–973 (2009)
Arora, K., Garg, P.: A Quantitative Survey of Various Fingerprint Enhancement Techniques. International Journal of Computer Applications 28(5), 24–28 (2011)
Surmacz, K., Saeed, K.: Robust Algorithm for Fingerprint Identification with a Simple Image Descriptor. In: Chaki, N., Cortesi, A. (eds.) CISIM 2011. CCIS, vol. 245, pp. 137–144. Springer, Heidelberg (2011)
Liu, M., Jiang, X., Kot, A.C.: Efficient Fingerprint Search based on Database Clustering. Elsevier Journal, Pattern Recognition 40(6), 1793–1803 (2007)
Xu, H., Veldhuis, R.N.J., Bazen, A.M., Kevenaar, T.A.M., Akkermans, T.A.H.M., Gokberk, B.: Fingerprint Verification using Spectral Minutiae Repre-sentations. IEEE Transactions on Information Forensics and Security 4(3), 397–409 (2009)
Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: A review. Elsevier Journal of Applied Soft Computing 11(2), 1565–1573 (2010)
Rudrapal, D., Das, S., Debbarma, S.: Improvisation of Biometrics Authentication and Identification through Keystrokes Pattern Analysis. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol. 8337, pp. 287–292. Springer, Heidelberg (2014)
Hegde, C., Prabhu, H.R., Sagar, D.S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Human Authentication Based on ECG Waves Using Radon Transform. In: Kim, T.-H., Fang, W.-C., Khan, M.K., Arnett, K.P., Kang, H.-J., Ślęzak, D. (eds.) SecTech/DRBC 2010. CCIS, vol. 122, pp. 197–206. Springer, Heidelberg (2010)
Gurkan, H., Guz, U., Yarman, B.S.: Modeling of Electrocardiogram Signals using Predefined Signature and Envelope Vector Sets. EURASIP Journal on Advances in Signal Processing, Springer Open Journal, 1–12 (2007)
Da Silva, H.P., Lourenço, A., Fred, A.L.N., Raposo, N., De-Sousa, M.A.: Check Your Biosignals Here: A New Dataset for Off-The-Person ECG Biomet-rics. Elsevier Journal, Computer Methods and Programs in Biomedicine 113(2), 503–514 (2014)
Singha, Y.N., Singh, S.K., Gupta, P.: Fusion of Electrocardiogram with Unobtru-sive Biometrics: An Efficient Individual Authentication System. Elsevier Journal, Pattern Recognition Letters 33(14), 1932–1941 (2012)
Isobe, Y., Ohki, T., Komatsu, N.: Security Performance Evaluation for Biometric Template Protection Techniques. International Journal of Biometrics 5(1), 53–72 (2013)
Gao, H., Zhang, Y., Liang, S., Li, D.: A New Chaotic Algorithm for Image En-cryption. Elsevier Journal, Chaos, Solitons and Fractals 29(2), 393–399 (2006)
Nandakumar, K., Jain, A., Pankanti, S.: Fingerprint-based Fuzzy Vault: Imple-mentation and Performance. IEEE Transactions on Information Forensics and Security 2(4), 744–757 (2007)
Upmanyu, M., Namboodiri, A.M., Srinathan, K., Jawahar, C.V.: Blind Authen-tication: A Secure Crypto- Biometric Verification Protocol. IEEE Transactions on Information Forensics and Security 5(2), 255–268 (2010)
Sui, Y., Zou, X., Du, E.Y., Li, F.: Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method. IEEE Transactions on Computers 63(4), 902–916 (2014)
Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number. Elsevier Journal, Pattern Recognition 37(11), 2245–2255 (2004)
Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)
Li, C.T., Hwang, M.S.: An Efficient Biometrics based Remote User Authentication Scheme using Smart Cards. Elsevier Journal, Journal of Network and Com-puter Applications 33(1), 1–5 (2010)
Fan, C.I., Lin, Y.H.: Provably Secure Remote Truly Three-Factor Authentication Scheme with Privacy Protection on Biometrics. IEEE Transactions on Informa-tion Forensics and Security 4(4), 933–945 (2009)
Yeh, H.L., Chen, T.H., Hu, K.J., Shih, W.K.: Robust Elliptic Curve Cryptogra-phy-based Three Factor User Authentication Providing Privacy of Biometric Data. IET Information Security 7(3), 247–252 (2013)
Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. IEEE Transactions on Parallel and Distributed Systems 22(8), 1390–1397 (2011)
Monaco, J.V., Bakelman, N., Cha, S., Tappert, C.C.: Developing A Keystroke Biometric System for Continual Authentication of Computer Users. In: Proceedings of European Intelligence and Security Informatics Conference, EISIC 2012, pp. 210–216 (2012)
Bio Password White Paper: Authentication Solutions through Keystroke Dynamics (2007), http://www.infosecurityproductsguide.com/technology/2007/BioPassword_Authentication_Solutions_WhitepaperFinal.pdf
Wang, S., Lee, W.N., Provost, J., Jianwen, L., Konofagou, E.E.: A Composite High-Frame-Rate System for Clinical Cardiovascular Imaging. IEEE Transaction on Ultrasonics, Ferroelectrics and Frequency Control 55(10), 2221–2233 (2008)
Moon, D., Chung, Y., Seo, C., Kim, S.Y., Kim, J.N.: A Practical Implementation of Fuzzy Fingerprint Vault for Smart Cards. Springer, Journal of Intelligent Manufacturing 25(2), 293–302 (2014)
Nagar, A., Nandakumar, K., Jain, A.K.: Multibiometric Cryptosystems Based on Feature-Level Fusion. IEEE Transactions on Information Forensics and Security 7(1), 255–268 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Bhattasali, T., Saeed, K., Chaki, N., Chaki, R. (2014). A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud. In: Saeed, K., Snášel, V. (eds) Computer Information Systems and Industrial Management. CISIM 2015. Lecture Notes in Computer Science, vol 8838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45237-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-662-45237-0_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45236-3
Online ISBN: 978-3-662-45237-0
eBook Packages: Computer ScienceComputer Science (R0)