(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Computer Research (IJACR)

ISSN (Print):2249-7277    ISSN (Online):2277-7970
Volume-8 Issue-37 July-2018
Full-Text PDF
DOI:10.19101/IJACR.2018.837010
Paper Title : A novel multi-user fingerprint minutiae based encryption and integrity verification for cloud data
Author Name : Ruth Ramya Kalangi and M. V. P. Chandra Sekhara Rao
Abstract :

Data confidentiality and integrity are two major aspects that the cloud users need to consider while deploying data in the cloud. Traditional integrity techniques use cryptographic hash algorithms, but most of these hash algorithms are vulnerable to third party attacks. Traditional encryption algorithms such as advanced encryption standard (AES), fully homomorphic attribute based encryption (FHABE) and key policy attribute based encryption (KP−ABE) are failed to generate biometric based attributes and policies due to limited computing resources and memory. So, novel multi-user fingerprint minutiae with ciphertext−policy attribute based encryption for integrity verification and encryption (MFM−CP−ABE) model is proposed. MFM−CP−ABE model considers fingerprints of multiple users as attributes for encryption and also calculates integrity value. This model is the combination of multi-user fingerprint minutiae (MFM) extraction policy integrity method and improved ciphertext policy attribute based encryption (ICP−ABE) algorithm. This model is efficient in comparison to the traditional models in terms of encryption and decryption time and data size.

Keywords : MFM−CP−ABE, Fingerprint biometry, Hash algorithm, Cloud computing.
Cite this article : Ruth Ramya Kalangi and M. V. P. Chandra Sekhara Rao, " A novel multi-user fingerprint minutiae based encryption and integrity verification for cloud data " , International Journal of Advanced Computer Research (IJACR), Volume-8, Issue-37, July-2018 ,pp.161-170.DOI:10.19101/IJACR.2018.837010
References :
[1]Lan C, Li H, Caifen WA. Analysis of the comments on “Identity-based distributed provable data possession in multicloud storage”. IEEE Transactions on Services Computing. 2017:1-1.
[Crossref] [Google Scholar]
[2]Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ. Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Transactions on Industrial Informatics. 2018:1-1.
[Crossref] [Google Scholar]
[3]Nayak SK, Tripathy S. SEPDP: secure and efficient privacy preserving provable data possession in cloud storage. IEEE Transactions on Services Computing. 2018:1-1.
[Crossref] [Google Scholar]
[4]Guo F, Mu Y, Susilo W, Hsing H, Wong DS, Varadharajan V. Optimized identity-based encryption from bilinear pairing for lightweight devices. IEEE Transactions on Dependable and Secure Computing. 2017; 14(2):211-20.
[Crossref] [Google Scholar]
[5]Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T. Privacy-preserving face recognition. In international symposium on privacy enhancing technologies symposium 2009 (pp. 235-53). Springer, Berlin, Heidelberg.
[Crossref] [Google Scholar]
[6]Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M. Design of secure user authenticated key management protocol for generic IOT networks. IEEE Internet of Things Journal. 2018; 5(1):269-82.
[Crossref] [Google Scholar]
[7]Atallah MJ, Hopper NJ. Privacy enhancing technologies. In international symposium on privacy enhancing technologies 2010 (pp. 21-3). Springer, Berlin, Heidelberg.
[Google Scholar]
[8]Torres WA, Bhattacharjee N, Srinivasan B. Effectiveness of fully homomorphic encryption to preserve the privacy of biometric data. In proceedings of the international conference on information integration and web-based applications & services 2014 (pp. 152-8). ACM.
[Crossref] [Google Scholar]
[9]Tarif EB, Wibowo S, Wasimi S, Tareef A. A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimedia Tools and Applications. 2018; 77(2):2485-503
[Crossref] [Google Scholar]
[10]Huang K, Shi J, Xian M, Liu J. Achieving robust biometric based access control mechanism for cloud computing. International conference on information and network security 2013 (pp. 1-7). IEEE.
[Crossref] [Google Scholar]
[11]Ma S. Identity-based encryption with outsourced equality test in cloud computing. Information Sciences. 2016; 328:389-402.
[Crossref] [Google Scholar]
[12]Zheng Q, Xu S, Ateniese G. VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In proceedings of international conference on computer communications 2014 (pp. 522-30). IEEE.
[Crossref] [Google Scholar]
[13]Wang Q, Peng L, Xiong H, Sun J, Qin Z. Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access. 2018; 6:760-71.
[Crossref] [Google Scholar]