International Journal of Advanced Computer Research (IJACR) ISSN (P): 2249-7277 ISSN (O): 2277-7970 Vol - 8, Issue - 37, July 2018
  1. 1
    Google Scholar
  2. 4
    Impact Factor
A novel multi-user fingerprint minutiae based encryption and integrity verification for cloud data

Ruth Ramya Kalangi and M. V. P. Chandra Sekhara Rao

Abstract

Data confidentiality and integrity are two major aspects that the cloud users need to consider while deploying data in the cloud. Traditional integrity techniques use cryptographic hash algorithms, but most of these hash algorithms are vulnerable to third party attacks. Traditional encryption algorithms such as advanced encryption standard (AES), fully homomorphic attribute based encryption (FHABE) and key policy attribute based encryption (KP−ABE) are failed to generate biometric based attributes and policies due to limited computing resources and memory. So, novel multi-user fingerprint minutiae with ciphertext−policy attribute based encryption for integrity verification and encryption (MFM−CP−ABE) model is proposed. MFM−CP−ABE model considers fingerprints of multiple users as attributes for encryption and also calculates integrity value. This model is the combination of multi-user fingerprint minutiae (MFM) extraction policy integrity method and improved ciphertext policy attribute based encryption (ICP−ABE) algorithm. This model is efficient in comparison to the traditional models in terms of encryption and decryption time and data size.

Keyword

MFM−CP−ABE, Fingerprint biometry, Hash algorithm, Cloud computing.

Cite this article

Refference

[1][1]Lan C, Li H, Caifen WA. Analysis of the comments on “Identity-based distributed provable data possession in multicloud storage”. IEEE Transactions on Services Computing. 2017:1-1.

[2][2]Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ. Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Transactions on Industrial Informatics. 2018:1-1.

[3][3]Nayak SK, Tripathy S. SEPDP: secure and efficient privacy preserving provable data possession in cloud storage. IEEE Transactions on Services Computing. 2018:1-1.

[4][4]Guo F, Mu Y, Susilo W, Hsing H, Wong DS, Varadharajan V. Optimized identity-based encryption from bilinear pairing for lightweight devices. IEEE Transactions on Dependable and Secure Computing. 2017; 14(2):211-20.

[5][5]Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T. Privacy-preserving face recognition. In international symposium on privacy enhancing technologies symposium 2009 (pp. 235-53). Springer, Berlin, Heidelberg.

[6][6]Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M. Design of secure user authenticated key management protocol for generic IOT networks. IEEE Internet of Things Journal. 2018; 5(1):269-82.

[7][7]Atallah MJ, Hopper NJ. Privacy enhancing technologies. In international symposium on privacy enhancing technologies 2010 (pp. 21-3). Springer, Berlin, Heidelberg.

[8][8]Torres WA, Bhattacharjee N, Srinivasan B. Effectiveness of fully homomorphic encryption to preserve the privacy of biometric data. In proceedings of the international conference on information integration and web-based applications & services 2014 (pp. 152-8). ACM.

[9][9]Tarif EB, Wibowo S, Wasimi S, Tareef A. A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimedia Tools and Applications. 2018; 77(2):2485-503

[10][10]Huang K, Shi J, Xian M, Liu J. Achieving robust biometric based access control mechanism for cloud computing. International conference on information and network security 2013 (pp. 1-7). IEEE.

[11][11]Ma S. Identity-based encryption with outsourced equality test in cloud computing. Information Sciences. 2016; 328:389-402.

[12][12]Zheng Q, Xu S, Ateniese G. VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In proceedings of international conference on computer communications 2014 (pp. 522-30). IEEE.

[13][13]Wang Q, Peng L, Xiong H, Sun J, Qin Z. Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access. 2018; 6:760-71.