SlideShare a Scribd company logo
Use Biometrics for Identity
Management of Cloud Users to
Enhanced the Security in Mobile
Cloud Computing
Presented By:
Vineet Garg, Research Scholar,
Punjab Technical University, Jalandhar
Introduction
Cloud computing is one of the emerging market and its goes big by the
period of time. According to the Bloomberg survey the cloud computing
will earn around $ 270 billion in 2020. Due to the advantages such as
flexibility, mobility, and costs saving, the number of cloud users is
expected to grow rapidly. Recent advances in cloud computing have given
a platform to various computationally heavy tasks and made them readily
accessible to even mobile devices. Cloud service providers provides
number of type of services to all type of users whether it is a organizations
that want to store its critical data on the cloud or a programmer those
want to execute their application on the cloud and want to store the
application on the cloud or it can be a person want to store its
songs/games on the cloud server and want excess of those things
anywhere in the world. The users of the cloud are growing and it will grow
in the near future due to the customize services provided by the cloud
service providers. As the users of cloud services grow the need of more
secured access of cloud is also required.
Most of the cloud service providers use
different types of identity management for
users to safely access their cloud. Some of the
Identity Management way for users of the
cloud [2]:
• Username/Password
• Device Identifier
• Application Identifier
• Public/Private Key Infrastructure Certificate
All the above said identity management
techniques use username/password as the
combination as these techniques can
recognized the user of the cloud only by the
username/password. Due to this organizations
need a secure way to authenticate its users in
order to ensure the functionality of their
services and data stored in the cloud storages
are managed in a private environment[3].
• To make access authentication more secured
biometrics authentication can be used as they give
unique identification of any user and there is no
need for user to remained there username/
passwords.
• To make biometric one of the identity management
for accessing cloud user need a device that can
capture the biometric of human and also some
mechanism that cloud service provider use to store
the biometric on cloud and verify it whenever a
user want to access the cloud. As biometrics
become one of the most secured way to access
anything on internet ,number of manufactures
provides inbuilt sensors in there devices.
The given figure shows how this can be done suing the smart
phones.
Issues with Biometrics to be used
with mobile phones to access the
cloud:
• Biometric Device on Smart Phones
• Where the biometric image to be stored
• How to secure biometric image
• Type of Biometric Sensing method to be used
on Smart phones
• Type of Operating System being used on Smart
phones
• Biometric Device on Smart Phones:
As we know the problem with using the biometric security
are the devices that being used for getting the image of
users biometric. These days number of devices are in the
market that can be used for get this thing possible and
there also number of sensors in the market that can
embedded in any device for capturing the image of
biometric. Smart phones are still going to adopt such type
of sensors. In Sept, 2013 the top manufacture of mobiles
Apple introduce the fingerprint scanner in iPhone 5c that
increase the possibility for more mobiles phone in the
market with fingerprint scanner[5]. The top manufacture
such as Samsung, Sony, LG, and HTC already announced
they are going to use fingerprint sensor in their upcoming
mobile phones. As the devices increase in the market with
incorporation of finger print scanner it become easy for
user to adopt biometric for security on clouds.
• Where the biometric image to be stored:
Biometric device generally capture the image of any biometric of the
human. These days’ sensors are used to get such type of image. In
backend these images are converted in to the graph and the graph
are converted into the unique PIN that being used in data base for
future reference. If the image is already captured with the biometric
sensors then the image is captured, converted in to the graph and in
PIN this PIN is compared with the stored PIN of user if it is matched
then the user allowed to access. If we use biometric of human for
accessing the cloud then where this image have to stored. If we
store such image on the cloud then the image captured by mobile
have to be transferred to cloud service provider when the graph and
PIN generation is performed for matching, then we need high speed
internet service for transferring such image to cloud and also need a
secured protocol that can transfer the image to the cloud service
provider. If we opt for storing image on mobile then we have to find
a mechanism to store the unique PIN generated on the mobile
phone to be stored on the cloud for future reference.
• How to secure biometric image:
As per the above point biometric image can be stored
on mobile or on cloud depending on the method being
used by the cloud service provider. In both of the
situation there are some issues that have to be resolve
such as what type of sensing method is to be used for
converting the biometric image into graph or in PIN on
the cloud and how it will work with different type of
sensors that are embedded on the smart phones, being
used for capturing images. If PIN is generated on the
mobile how the cloud service provider will judge
whether the PIN is generated by the mobile phone
after capturing the biometric image of the human or it
can be a PIN generated by a program that is executed
on the internet.
• Type of Biometric Sensing method to be used
on Smart phones:
There are number of type of biometric sensing method can be
used for capturing the image of the human biometric.
Different sensors may output images that exhibit variations in
resolution, size, distortion, contrast, background noise, and so
on. Different encoders may extract different features or adopt
varying definitions of the same feature. This diversity makes it
difficult to build a fingerprint system with principal
components sourced from different vendors[6].
Figure-2: Optical Sensor, Thermal Sensor, Solid State Sensors
• Type of Operating System being used on Smart
phones[7]:
Following are some of the latest operating system
being used in smart phones. The Application used
for capturing image is permanent storage of the
smart phone have to be installed on these
operating systems.
1)Android
2)BlackBerry
3)iOS
4)Windows Phone
5)Firefox OS
etc..
Purposed Architecture that can incorporate
Biometric thumb impression for accessing the
Cloud Server:
• Operating System incorporate at least one
application of biometric with specific sensor
• Security concern biometric image captured by
sensors have to be store on the cloud.
• Whenever User wants to access its cloud,
cloud service provider first identify the
operating environment installed on the smart
phone and transfers it to dedicated cloud
server
Conclusion
• Cloud computing is the concept of working with your
data/application anywhere in the world; you just needed a
computer and an internet connection. Smart phones are
one of the best alternatives of personal computers with the
internet connection that can be easily carried by user.
Smart phone market is growing and it set to grow in near
future, According to a recent research, a New York- based
firm, study that more than 240 million businesses will use
cloud services through mobile devices by 2015. That
traction will push the revenue of mobile cloud computing
to $5.2 billion. With this perspective we had tried to discuss
security of the data/application on the cloud of the user
that is the one of the major issues related to smart phones
and tried to give our own opinion to resolve this issue.
Regards
Vineet Garg, Asst. Professor,MCA
PhD(Pursuing)
grvineet1@gmail.com
989114021

More Related Content

PPTX
Securing Mobile Cloud Using Fingerprint Authentication
PDF
Residential access control system using QR code and the IoT
PDF
Cloud based Anti-Theft Application for Android Devices: A Literature Review
PDF
Dual method cryptography image by two force secure and steganography secret m...
PDF
IRJET - Cyber Security Threats and Vulnerabilities in IoT
DOCX
Home security system using internet of things
PDF
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
PPTX
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
Securing Mobile Cloud Using Fingerprint Authentication
Residential access control system using QR code and the IoT
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Dual method cryptography image by two force secure and steganography secret m...
IRJET - Cyber Security Threats and Vulnerabilities in IoT
Home security system using internet of things
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors

What's hot (20)

PDF
Comparative Study on Intrusion Detection Systems for Smartphones
PDF
IRJET- Two Way Authentication for Banking Systems
PDF
Design and Implementation of Smart Bell Notification System using IoT
PDF
Remote surveillance system for mobile application
PDF
IRJET - Door Lock Control using Wireless Biometric
PPTX
Internet of Things -Indoor Environmental Monitoring And Control System
PDF
A Novel Security Approach for Communication using IOT
PPT
Cryptography introduction
PPTX
IoT-The Internet of Things
PPTX
Lecture 16
PDF
Cloud Forensics- An IS Approach
PPTX
Internet of Things(IoT)
PPTX
“AI techniques in cyber-security applications”. Flammini lnu susec19
PDF
Detect and immune mobile cloud infrastructure
PDF
IRJET - Smart Doorbell System
PDF
PDF
IRJET- Technical Review of different Methods for Multi Factor Authentication
PDF
Malware threat analysis techniques and approaches for IoT applications: a review
PDF
Developed security and privacy algorithms for cyber physical system
PDF
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
Comparative Study on Intrusion Detection Systems for Smartphones
IRJET- Two Way Authentication for Banking Systems
Design and Implementation of Smart Bell Notification System using IoT
Remote surveillance system for mobile application
IRJET - Door Lock Control using Wireless Biometric
Internet of Things -Indoor Environmental Monitoring And Control System
A Novel Security Approach for Communication using IOT
Cryptography introduction
IoT-The Internet of Things
Lecture 16
Cloud Forensics- An IS Approach
Internet of Things(IoT)
“AI techniques in cyber-security applications”. Flammini lnu susec19
Detect and immune mobile cloud infrastructure
IRJET - Smart Doorbell System
IRJET- Technical Review of different Methods for Multi Factor Authentication
Malware threat analysis techniques and approaches for IoT applications: a review
Developed security and privacy algorithms for cyber physical system
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
Ad

Similar to Use biometrics for identity management of cloud users to enhanced the security in mobile cloud computing (20)

PDF
Biometric Identification and Authentication Providence using Fingerprint for ...
PDF
Securing mobile cloud using finger print authentication
PDF
Securing Mobile Cloud Using Finger Print Authentication
PDF
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
PDF
Iciea08
PPTX
Rahuls final ppt
PPTX
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
PDF
Security and Privacy of Big Data in Mobile Devices
DOC
13 biometrics - fool proof security
PPTX
Fingerprint recognitions on smart phone
PDF
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
PDF
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
PPTX
Financial services 20150503
PDF
PDF
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
PDF
Secure hash based distributed framework for utpc based cloud authorization
PDF
Secure hash based distributed framework for utpc based cloud authorization
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
PDF
Enhanced security framework to ensure data security
Biometric Identification and Authentication Providence using Fingerprint for ...
Securing mobile cloud using finger print authentication
Securing Mobile Cloud Using Finger Print Authentication
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
Iciea08
Rahuls final ppt
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Security and Privacy of Big Data in Mobile Devices
13 biometrics - fool proof security
Fingerprint recognitions on smart phone
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
Financial services 20150503
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Enhanced security framework to ensure data security in cloud using security b...
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Enhanced security framework to ensure data security
Ad

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
KodekX | Application Modernization Development
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Approach and Philosophy of On baking technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
cuic standard and advanced reporting.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Review of recent advances in non-invasive hemoglobin estimation
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
KodekX | Application Modernization Development
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Big Data Technologies - Introduction.pptx
sap open course for s4hana steps from ECC to s4
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
Approach and Philosophy of On baking technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation_ Review paper, used for researhc scholars
Review of recent advances in non-invasive hemoglobin estimation

Use biometrics for identity management of cloud users to enhanced the security in mobile cloud computing

  • 1. Use Biometrics for Identity Management of Cloud Users to Enhanced the Security in Mobile Cloud Computing Presented By: Vineet Garg, Research Scholar, Punjab Technical University, Jalandhar
  • 2. Introduction Cloud computing is one of the emerging market and its goes big by the period of time. According to the Bloomberg survey the cloud computing will earn around $ 270 billion in 2020. Due to the advantages such as flexibility, mobility, and costs saving, the number of cloud users is expected to grow rapidly. Recent advances in cloud computing have given a platform to various computationally heavy tasks and made them readily accessible to even mobile devices. Cloud service providers provides number of type of services to all type of users whether it is a organizations that want to store its critical data on the cloud or a programmer those want to execute their application on the cloud and want to store the application on the cloud or it can be a person want to store its songs/games on the cloud server and want excess of those things anywhere in the world. The users of the cloud are growing and it will grow in the near future due to the customize services provided by the cloud service providers. As the users of cloud services grow the need of more secured access of cloud is also required.
  • 3. Most of the cloud service providers use different types of identity management for users to safely access their cloud. Some of the Identity Management way for users of the cloud [2]: • Username/Password • Device Identifier • Application Identifier • Public/Private Key Infrastructure Certificate
  • 4. All the above said identity management techniques use username/password as the combination as these techniques can recognized the user of the cloud only by the username/password. Due to this organizations need a secure way to authenticate its users in order to ensure the functionality of their services and data stored in the cloud storages are managed in a private environment[3].
  • 5. • To make access authentication more secured biometrics authentication can be used as they give unique identification of any user and there is no need for user to remained there username/ passwords. • To make biometric one of the identity management for accessing cloud user need a device that can capture the biometric of human and also some mechanism that cloud service provider use to store the biometric on cloud and verify it whenever a user want to access the cloud. As biometrics become one of the most secured way to access anything on internet ,number of manufactures provides inbuilt sensors in there devices.
  • 6. The given figure shows how this can be done suing the smart phones.
  • 7. Issues with Biometrics to be used with mobile phones to access the cloud: • Biometric Device on Smart Phones • Where the biometric image to be stored • How to secure biometric image • Type of Biometric Sensing method to be used on Smart phones • Type of Operating System being used on Smart phones
  • 8. • Biometric Device on Smart Phones: As we know the problem with using the biometric security are the devices that being used for getting the image of users biometric. These days number of devices are in the market that can be used for get this thing possible and there also number of sensors in the market that can embedded in any device for capturing the image of biometric. Smart phones are still going to adopt such type of sensors. In Sept, 2013 the top manufacture of mobiles Apple introduce the fingerprint scanner in iPhone 5c that increase the possibility for more mobiles phone in the market with fingerprint scanner[5]. The top manufacture such as Samsung, Sony, LG, and HTC already announced they are going to use fingerprint sensor in their upcoming mobile phones. As the devices increase in the market with incorporation of finger print scanner it become easy for user to adopt biometric for security on clouds.
  • 9. • Where the biometric image to be stored: Biometric device generally capture the image of any biometric of the human. These days’ sensors are used to get such type of image. In backend these images are converted in to the graph and the graph are converted into the unique PIN that being used in data base for future reference. If the image is already captured with the biometric sensors then the image is captured, converted in to the graph and in PIN this PIN is compared with the stored PIN of user if it is matched then the user allowed to access. If we use biometric of human for accessing the cloud then where this image have to stored. If we store such image on the cloud then the image captured by mobile have to be transferred to cloud service provider when the graph and PIN generation is performed for matching, then we need high speed internet service for transferring such image to cloud and also need a secured protocol that can transfer the image to the cloud service provider. If we opt for storing image on mobile then we have to find a mechanism to store the unique PIN generated on the mobile phone to be stored on the cloud for future reference.
  • 10. • How to secure biometric image: As per the above point biometric image can be stored on mobile or on cloud depending on the method being used by the cloud service provider. In both of the situation there are some issues that have to be resolve such as what type of sensing method is to be used for converting the biometric image into graph or in PIN on the cloud and how it will work with different type of sensors that are embedded on the smart phones, being used for capturing images. If PIN is generated on the mobile how the cloud service provider will judge whether the PIN is generated by the mobile phone after capturing the biometric image of the human or it can be a PIN generated by a program that is executed on the internet.
  • 11. • Type of Biometric Sensing method to be used on Smart phones: There are number of type of biometric sensing method can be used for capturing the image of the human biometric. Different sensors may output images that exhibit variations in resolution, size, distortion, contrast, background noise, and so on. Different encoders may extract different features or adopt varying definitions of the same feature. This diversity makes it difficult to build a fingerprint system with principal components sourced from different vendors[6]. Figure-2: Optical Sensor, Thermal Sensor, Solid State Sensors
  • 12. • Type of Operating System being used on Smart phones[7]: Following are some of the latest operating system being used in smart phones. The Application used for capturing image is permanent storage of the smart phone have to be installed on these operating systems. 1)Android 2)BlackBerry 3)iOS 4)Windows Phone 5)Firefox OS etc..
  • 13. Purposed Architecture that can incorporate Biometric thumb impression for accessing the Cloud Server:
  • 14. • Operating System incorporate at least one application of biometric with specific sensor • Security concern biometric image captured by sensors have to be store on the cloud. • Whenever User wants to access its cloud, cloud service provider first identify the operating environment installed on the smart phone and transfers it to dedicated cloud server
  • 15. Conclusion • Cloud computing is the concept of working with your data/application anywhere in the world; you just needed a computer and an internet connection. Smart phones are one of the best alternatives of personal computers with the internet connection that can be easily carried by user. Smart phone market is growing and it set to grow in near future, According to a recent research, a New York- based firm, study that more than 240 million businesses will use cloud services through mobile devices by 2015. That traction will push the revenue of mobile cloud computing to $5.2 billion. With this perspective we had tried to discuss security of the data/application on the cloud of the user that is the one of the major issues related to smart phones and tried to give our own opinion to resolve this issue.
  • 16. Regards Vineet Garg, Asst. Professor,MCA PhD(Pursuing) grvineet1@gmail.com 989114021