Articles | Open Access |

LEVERAGING FINGERPRINT BIOMETRICS FOR ROBUST MOBILE CLOUD SECURITY

Rehab Qureshi , Department of Computer Science,King Saud University,Riyadh, Saudi Arabia

Abstract

With the rapid growth of mobile cloud computing, securing sensitive data and applications has become a paramount concern. Traditional authentication methods often fall short in providing the necessary level of security against evolving threats. This study explores the integration of fingerprint biometrics as a means to enhance the security of mobile cloud environments. By leveraging the unique and immutable nature of fingerprint patterns, we propose a robust authentication framework that addresses common vulnerabilities associated with conventional methods. Our approach involves implementing a multi-layered security model that combines fingerprint recognition with encryption and access control mechanisms. We evaluate the effectiveness of this model through a series of performance and security assessments, demonstrating its potential to significantly mitigate unauthorized access and data breaches. The results indicate that fingerprint biometrics not only improve authentication accuracy but also contribute to a more secure and user-friendly mobile cloud experience. This study underscores the importance of adopting advanced biometric technologies to safeguard mobile cloud infrastructures and offers a practical solution for enhancing their security posture.

 

Keywords

Fingerprint Biometrics, Mobile Cloud Security, Authentication

References

X.Li, "Cloud Computing: Introduction, Application and Security from Industry Perspectives," International Journal of Computer Science and Network Security, vol. 11, pp. 224-228, 2011.

X.Yu and Q. Wen, "Design of Security Solution to Mobile Cloud Storage," Knowledge Discovery and Data Mining, pp. 255-263, 2012.

J.Rittinghouse, Cloud computing: implementation, management, and security: CRC, 2009.

M.Ali, "Can a Mobile Cloud Be More Trustworthy than a Traditional Cloud?," Security and Privacy in Mobile Information and Communication Systems, pp. 125-135, 2012.

F.Omri, R. Hamila, S. Foufou, and M. Jarraya, "Cloud-Ready Biometric System for Mobile Security Access," Networked Digital Technologies, pp. 192-200, 2012.

J.Hurwitz, R. Bloor, M. Kaufman, and F. Halper, Cloud computing for dummies vol. 1: For Dummies, 2009.

T.Mather, S. Kumaraswamy, and S. Latif, Cloud security and privacy: an enterprise perspective on risks and compliance: O'Reilly Media, Incorporated, 2009.

H.T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: architecture, applications, and approaches," Wireless Communications and Mobile Computing, 2011.

T.H. Chen, H. Yeh, and W. K. Shih, "An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing," in Multimedia and Ubiquitous Engineering (MUE), 2011 5th FTRA International Conference on, 2011, pp. 155-159.

A.J. Choudhury, P. Kumar, M. Sain, H. Lim, and H. Jae-Lee, "A Strong User Authentication Framework for Cloud Computing," in Services Computing Conference (APSCC), 2011 IEEE AsiaPacific, 2011, pp. 110-115.

H.Dinesha and V. Agrawal, "Multi-level authentication technique for accessing cloud services," in Computing, Communication and Applications (ICCCA), 2012 International Conference on, 2012, pp. 1-4.

D.S. Oh, B. H. Kim, and J. K. Lee, "A Study on Authentication System Using QR Code for Mobile Cloud Computing Environment," Future Information Technology, pp. 500-507, 2011.

J.H. Yang and C. C. Chang, "An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem," Computers & Security, vol. 28, pp. 138-143, 2009.

R.Mueller and R. Sanchez-Reillo, "An Approach to Biometric Identity Management Using Low Cost Equipment," in Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP'09. Fifth International Conference on, 2009, pp. 1096-1100.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

LEVERAGING FINGERPRINT BIOMETRICS FOR ROBUST MOBILE CLOUD SECURITY. (2024). International Journal of Networks and Security, 4(01), 18-21. https://www.academicpublishers.org/journals/index.php/ijns/article/view/1288