Font Size: a A A

An Indirect Fingerprint Authentication Scheme In Cloud Computing System

Posted on:2015-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:X C JiangFull Text:PDF
GTID:2268330428961179Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of information technology, information security has become an assignable problem in information systems, especially in the cloud computing system. The cloud computing offers dynamically scalable online resources provisioned as a service over the Internet cheaply. However, the security challenges it poses are equally striking. The reliable user authentication techniques are required to combat the rising security threat in cloud communications.The traditional digital authentication is weak for the easiness to copy and reuse. With the development of biometric technology, it is considered to be one of the best solutions for the problems faced by the traditional identity authentication technology. Fingerprint authentication is one of the popular and effective approaches to allow the only authorized users to access the cryptographic keys. However, the recognition speed and the recognition rate are difficult to co-exist. In addition, the traditional biometric authentication technology has the problem of leaking biometric feature template which is hard to rebuild.Based on the fingerprint template leakage problem in the fingerprint identification, the indirect authentication method using the combination of fingerprint and the traditional key is paid more and more attention. Biometric crypto-systems can operate in one of the following three modes:1) key release mode;2) key binding mode;3) key generation mode. In the key release mode, the key is released only if the biometric matching is successful, which forms a multifactor authentication scheme. However, the biometric template is not secure in this scheme, and the stolen templates cannot be revoked. In the key binding mode, the biological characteristics are as the lock of the traditional authentication, the key and the template are bound within a cryptographic framework, and the system itself does not store the template information, which is called Biometric Encryption Technology. In the key generation mode, the key is derived directly from the biometric data and is not stored in the feature database.The main contributions of this paper are summarized as follows:1. In this paper, we discuss the today’s status of the identification technology based on fingerprint in Cloud Computing System, and analyze the advantages and disadvantages of the various recognition algorithms. Through the experiment, we can observe the efficiency and coexistence problem in time and recognition rate.2. In this paper, we make research on the biometric encryption technology. To overcome the mentioned shortcomings, Fuzzy Vault Scheme Based on Classification of Fingerprint Features Scheme is proposed. At last, a comprehensive and detailed security analysis of the proposed scheme in cloud computing is provided.3. In this paper, we apply this secure scheme to the cloud system combing with USBKEY technology, an indirect fingerprint authentication scheme is realized. The author participated in the design and development of the prototype system. The operation results of the system show that the efficiency and the security of the scheme can meet the needs of practical applications.
Keywords/Search Tags:Cloud Computing Security, Fingerprint Authentication, BiometricEncryption Technology, Indirect Authentication Method
PDF Full Text Request
Related items