Vol: 59(73) No: 2 / December 2014 Cryptographic Applications of Biometric Methods in Cloud Storage Sharing Marius-Alexandru Velciu Department of Computer Science, Military Technical Academy, Bucharest, Romania, e-mail: alexandruvelciu@gmail.com Alecsandru Pătrașcu Department of Computer Science, Military Technical Academy , Bucharest, Romania, e-mail: alecsandru.patrascu@gmail.com Valeriu Patriciu Department of Computer Science, Military Technical Academy, Bucharest, Romania, e-mail: victorpatriciu@yahoo.com Keywords: bio-cryptography; biometric encryption; fuzzy-vault algorithm; cepstral analysis; cloud computing secure data storage ; cloud computing access control Abstract In todays computing systems, the adition of biometric components as a authentication system, represents a more often security practice encountered, during the past years. But still, as traditional biometric systems have always been regarded with skepticism, common efforts of cryptographic and biometric systems researchers emerged Bio-cryptography, a domain which addresses the main security issues of biometrics usage. In this paper, we propose a new and novel authenticaton mechanism for Cloud storage sharing, which provides both safe access to the system and storage encryption, using a voice-based bio-cryptographic infrastructure. We describe our architecture, in detail, trying to emphasize the advantages of combining traditional cryptographic authentication and encryption mechanisms with biometrics, within the so-called Biometric Encryption process. References [1] K. Nandakumar and A. K. Jain, “Fingerprint-Based Fuzzy Vault : Implementation and Performance”, IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, pp. 744-757, 2007. [2] U. Uludag and A. K. Jain, “Fingerprint-based Fuzzy Vault”, Department of Computer Science and Engineering. Michigan State University, 2007. [3] N. Radha, S. Karthikeyan and P. Anupriya, “Securing Retina Fuzzy Vault System using Soft Biometrics”, in Global Journal of Computer Science and Technology, Vol. 10, No. 7, pp. 13-18, 2010. [4] S. Zawoad, A.K. Dutta and R. Hasan, “SecLaaS : Secure Logging-as-a-Service for Cloud Forensics”, in ACM Symposium on Information, Computer and Communications Security, 2013. [5] M. Bellare, S. Keelveedhi and T. Ristenpart, “Message-Locked Encryption and Secure Deduplication”, in International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT, 2013. [6] A. Stoianov and A. Cavoukian, “A Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy”, in International Federation for Information Processing, vol. 261, pp. 57-77, 2008. [7] K. Xi and J. Hu. “Bio-Cryptography. Handbook of Information and Communication Security”, pp. 129-157, 2010. [8] A. K. Jain, P. Flynn and A. A. Ross. “Handbook of Biometrics”, Springer, pp. 151-170, 2008. [9] A.K. Jain, “Biometric Template Security”, EURASIP Journal on Advances in Signal Processing, 2008. [10] A. Pătraşcu and V. Patriciu, “Beyond Digital Forensics. A Cloud Computing Perspective Over Incident Response and Reporting”, in IEEE International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania, 2013. |