Biometric Authentication in Cloud

  • Kshitij U. PimpleEmail author
  • Nilima M. Dongre
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 38)


Cloud computing is used to store information and supply computing services and resources to humans available all over the internet. Huge amount of data is being saved in data centers, which could therefore create chance for records leakage and get a right of entry to develop illegitimate customers. Authentication of users therefore helps to make sure and confirm a person’s identification earlier than granting him/her get admission into cloud Storage system. The main goal of this method is to authenticate at client-side server, server side, or as third party, and the use of special techniques to maintain the information in a relaxed and secure way. We present a overview on the exceptional authentication mechanisms used in cloud. Our Main focus is on providing biometric authentication for cloud-based structures. In addition, we develop awareness on physical and behavioral based biometric authentication techniques and offer a comparative analysis as which method is better in each instance and thereby provides a better authentication mechanism for cloud.


Biometric authentication Physical biometric Behavioral biometric Cloud computing Authentication schemes 


  1. 1.
    Lohiya, R., John, P., Shah, P.: Survey on mobile forensics. Int. J. Comput. Appl. (2015)Google Scholar
  2. 2.
    Rassan, I.A.L., AlShaher, H.: Securing mobile cloud computing using biometric authentication (SMCBA). In: 2014 International Conference on Computational Science and Computational Intelligence (2014)Google Scholar
  3. 3.
    Venakatesan, N., Rathan Kumar, M.: Finger print authentication for improved cloud security. In: 2016 International Conference on Computational Systems and Information Systems for Sustainable Solutions (2016)Google Scholar
  4. 4.
    Raghava, N.S.: IRIS recognıtıon on hadoop: a bıometrıcs system ımplementatıon on cloud computıng. In: Proceedings of IEEE CCIS (2011)Google Scholar
  5. 5.
    Sabri, H.M., Elkhameesy, N., Hefny, H.A.: Using Iris Recognition to Secure Medical Images on the Cloud. IEEE. 978-1-4673-9669-1/15/31.00/2015Google Scholar
  6. 6.
    Borodavka, V., Tsuranov, M.: Biometrics: analysis and multi-criterion selection. In: The 9th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT 2018, Kyiv, Ukraine, 24–27 May 2018 (2018)Google Scholar
  7. 7.
    Bapat, A., Kanhangad, V.: Segmentation of hand from cluttered backgrounds for hand geometry biometrics. IEEE. 978-1-5090-6255-3/17/31.00 2017Google Scholar
  8. 8.
    Varchol, P., Levicky, D., Juhar, J.: Multimodal biometric authentication using speech and hand geometry fusion. In: 2016 15th International Conference on Systems, Signals and Image Processing (2016)Google Scholar
  9. 9.
    Naveen, S., Shihana Fathima, R., Moni, R.S.: Face recognition and authentication using LBP and BSIF. In: 2016 International Conference on Communication Systems and Networks (ComNet), Trivandrum, 21–23 July 2016 (2016)Google Scholar
  10. 10.
    Pawle, A.A., Pawar, V.P.: Face recognition system (FRS) on cloud computing for user authentication. Int. J. Soft Comput. Eng. (IJSCE) 3(4) (2013). ISSN 2231-2307Google Scholar
  11. 11.
    Dhagat, R., Joshi, P.: New approach of user authentication using digital signature. In: 2016 Symposium on Colossal Data Analysis and Networking (CDAN) (2016)Google Scholar
  12. 12.
    Bharadi, V.A., D’Silva, G.M.: Online signature recognition using software as a service (SaaS) model on public cloud. In: 2015 International Conference on Computing Communication Control and Automation (2015)Google Scholar
  13. 13.
    Jayamaha, R.G.M.M., Senadheera, M.R.R., Gamage, T.N.C., Weerasekara, K.D.P.B., Dissanayaka, G.A., Kodagoda, G.N.: VoizLock – human voice authentication system using hidden Markov model. In: ICIAFS 2008. IEEE (2008). 978-1-4244-2900-4/08/25.00 c 2017Google Scholar
  14. 14.
    Ho, J., Kang, D.-K.: Sequence alignment of dynamic ıntervals for keystroke dynamics based user authentication. In: SCISISIS 2014, Kitakyushu, Japan, 3–6 December 2014Google Scholar
  15. 15.
    Dong, J., Meng, X., Chen, M., Wang, Z.: Template protection based on DNA coding for multimodal biometric recognition. In: 2017 4th International Conference on Systems and Informatics (ICSAI 2017) (2017)Google Scholar
  16. 16.
    Ghany, K.K.A., Hassan, G., Hassanien, A.E., Hefny, H.A., Schaefer, G., Ahad, M.A.R.: A hybrid biometric approach embedding DNA data in fingerprint ımages. In: 3rd Internatıonal Conference on Informatıcs, Electronıcs, Vision (2014)Google Scholar
  17. 17.
    Babaeizadeh, M., Bakhtiari, M., Mohammed, A.M.: Authentication methods in cloud computing: a survey. Res. J. Appl. Sci. Eng. Technol. 9(8), 655–664 (2015)CrossRefGoogle Scholar
  18. 18.
    Meena, S., Syal, R.: Authentication scheme in cloud computing: a review. IEEE. 978-1-5090-3239-6/17/31.00/2017Google Scholar
  19. 19.
    Sridhar, S., Smys, S.: A hybrid multilevel authentication schemeFor private cloud environment. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), 7 January 2016, pp. 1–5. IEEE (2016)Google Scholar
  20. 20.
    Karthiban, K., Smys, S.: Privacy preserving approaches in cloud computing. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC) 19 January 2018, pp. 462–467. IEEE (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Information TechnologyRamrao Adik Institute of TechnologyNavi MumbaiIndia

Personalised recommendations