Cargando…
Secure biometric authentication with de-duplication on distributed cloud storage
Cloud computing is one of the evolving fields of technology, which allows storage, access of data, programs, and their execution over the internet with offering a variety of information related services. With cloud information services, it is essential for information to be saved securely and to be...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8330427/ https://www.ncbi.nlm.nih.gov/pubmed/34401472 http://dx.doi.org/10.7717/peerj-cs.569 |
_version_ | 1783732714715742208 |
---|---|
author | M, Vinoth Kumar Venkatachalam, K P, Prabu Almutairi, Abdulwahab Abouhawwash, Mohamed |
author_facet | M, Vinoth Kumar Venkatachalam, K P, Prabu Almutairi, Abdulwahab Abouhawwash, Mohamed |
author_sort | M, Vinoth Kumar |
collection | PubMed |
description | Cloud computing is one of the evolving fields of technology, which allows storage, access of data, programs, and their execution over the internet with offering a variety of information related services. With cloud information services, it is essential for information to be saved securely and to be distributed safely across numerous users. Cloud information storage has suffered from issues related to information integrity, data security, and information access by unauthenticated users. The distribution and storage of data among several users are highly scalable and cost-efficient but results in data redundancy and security issues. In this article, a biometric authentication scheme is proposed for the requested users to give access permission in a cloud-distributed environment and, at the same time, alleviate data redundancy. To achieve this, a cryptographic technique is used by service providers to generate the bio-key for authentication, which will be accessible only to authenticated users. A Gabor filter with distributed security and encryption using XOR operations is used to generate the proposed bio-key (biometric generated key) and avoid data deduplication in the cloud, ensuring avoidance of data redundancy and security. The proposed method is compared with existing algorithms, such as convergent encryption (CE), leakage resilient (LR), randomized convergent encryption (RCE), secure de-duplication scheme (SDS), to evaluate the de-duplication performance. Our comparative analysis shows that our proposed scheme results in smaller computation and communication costs than existing schemes. |
format | Online Article Text |
id | pubmed-8330427 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-83304272021-08-15 Secure biometric authentication with de-duplication on distributed cloud storage M, Vinoth Kumar Venkatachalam, K P, Prabu Almutairi, Abdulwahab Abouhawwash, Mohamed PeerJ Comput Sci Artificial Intelligence Cloud computing is one of the evolving fields of technology, which allows storage, access of data, programs, and their execution over the internet with offering a variety of information related services. With cloud information services, it is essential for information to be saved securely and to be distributed safely across numerous users. Cloud information storage has suffered from issues related to information integrity, data security, and information access by unauthenticated users. The distribution and storage of data among several users are highly scalable and cost-efficient but results in data redundancy and security issues. In this article, a biometric authentication scheme is proposed for the requested users to give access permission in a cloud-distributed environment and, at the same time, alleviate data redundancy. To achieve this, a cryptographic technique is used by service providers to generate the bio-key for authentication, which will be accessible only to authenticated users. A Gabor filter with distributed security and encryption using XOR operations is used to generate the proposed bio-key (biometric generated key) and avoid data deduplication in the cloud, ensuring avoidance of data redundancy and security. The proposed method is compared with existing algorithms, such as convergent encryption (CE), leakage resilient (LR), randomized convergent encryption (RCE), secure de-duplication scheme (SDS), to evaluate the de-duplication performance. Our comparative analysis shows that our proposed scheme results in smaller computation and communication costs than existing schemes. PeerJ Inc. 2021-07-30 /pmc/articles/PMC8330427/ /pubmed/34401472 http://dx.doi.org/10.7717/peerj-cs.569 Text en ©2021 M et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Artificial Intelligence M, Vinoth Kumar Venkatachalam, K P, Prabu Almutairi, Abdulwahab Abouhawwash, Mohamed Secure biometric authentication with de-duplication on distributed cloud storage |
title | Secure biometric authentication with de-duplication on distributed cloud storage |
title_full | Secure biometric authentication with de-duplication on distributed cloud storage |
title_fullStr | Secure biometric authentication with de-duplication on distributed cloud storage |
title_full_unstemmed | Secure biometric authentication with de-duplication on distributed cloud storage |
title_short | Secure biometric authentication with de-duplication on distributed cloud storage |
title_sort | secure biometric authentication with de-duplication on distributed cloud storage |
topic | Artificial Intelligence |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8330427/ https://www.ncbi.nlm.nih.gov/pubmed/34401472 http://dx.doi.org/10.7717/peerj-cs.569 |
work_keys_str_mv | AT mvinothkumar securebiometricauthenticationwithdeduplicationondistributedcloudstorage AT venkatachalamk securebiometricauthenticationwithdeduplicationondistributedcloudstorage AT pprabu securebiometricauthenticationwithdeduplicationondistributedcloudstorage AT almutairiabdulwahab securebiometricauthenticationwithdeduplicationondistributedcloudstorage AT abouhawwashmohamed securebiometricauthenticationwithdeduplicationondistributedcloudstorage |