Cloud Server Security using Bio-Cryptography
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 3
Abstract
Data security is becoming more important in cloud computing. Biometrics is a computerized method of identifying a person based on a physiological characteristic. Among the features measured are our face, fingerprints, hand geometry, DNA etc. Biometric can fortify to store the cloud server using bio-cryptography. The Bio-cryptography key is used to secure the scrambled data in the cloud environment. The Bio-cryptography technique uses fingerprint, voice or iris as a key factor to secure the data encryption and decryption in the cloud server. In this paper, the security of the biometric system through cloud computing is discussed along with improvement regarding its performance to avoid the criminal to access the data. Biometric is a genuine feature for the cloud provider. Cryptography algorithm will be explained using blockchain technology to overcome security issues. The blockchain technology will provide more protection through cryptographic keys to secure biometric data.
Authors and Affiliations
Zarnab Khalid, Muhammad Rizwan, Aysha Shabbir, Maryam Shabbir, Fahad Ahmad, Jaweria Manzoor
VoIP QoS Analysis over Asterisk and Axon Servers in LAN Environment
Voice over IP (VoIP) is a developing technology and a key factor in both the emerging cyberspace engineering and also an accomplishment to set up its position in the telecom industry. VoIP technology is based on internet...
The P System Design Method based on the P Module
Membrane computing is a kind of biocomputing model. At present, the main research areas of membrane computing are computational models and P system design. With the expansion of the P system scale, how to rapidly constru...
A New Comment on Reinforcement of Testing Criteria
This paper presents the formal aspects of testing criteria for Safety Critical Systems. A brief review of testing strategies i.e. white box and black box is given along with their various criteria’s. Z Notation; a formal...
Interaction Protocols in Multi-Agent Systems based on Agent Petri Nets Model
This paper deals with the modeling of interaction between agents in Multi Agents System (MAS) based on Agent Petri Nets (APN). Our models are created based on communicating agents. Indeed, an agent initiating a conversat...
An Improved Scheme on Morphological Image Segmentation Using the Gradients
An improved scheme for contour detection with better performance measure has been proposed. It is based on the response of human visual system during visualization of any type of an image. The scheme consisted of two par...