An indirect fingerprint authentication scheme in cloud computing | |
Jiang, Xing Chen ; Zheng, Jian De ; Zheng JD(郑建德) | |
2014 | |
关键词 | Biometrics Cloud computing Manufacture Security systems |
英文摘要 | Conference Name:3rd International Conference on Green Power, Materials and Manufacturing Technology and Applications, GPMMTA 2013. Conference Address: Wuhan, China. Time:December 27, 2013 - December 30, 2013.; National Natural Science Foundation of China (NSFC); Provincial Natural Science Foundation of Hunan; Provincial Science and Technology plan project of Hunan; The cloud computing offers dynamically scalable online resources provisioned as a service over the Internet cheaply. However, the security challenges it poses are equally striking. The reliable user authentication techniques are required to combat the rising security threat in cloud communications. Due to the non-denial requirements of remote user authentication scheme, it is most commonly achieved using some form of biometrics-based method. Fingerprint authentication is one of the popular and effective approaches to allow the only authorized users to access the cryptographic keys. While the critical issue in remote biometric cryptosystem is to protect the template of a user stored in a database. The biometric template is not secure and the stolen templates cannot be revoked, which is easy to leak user identity information. To overcome these shortcomings, in this paper, an indirect fingerprint authentication scheme is proposed. Further, we apply this secure scheme to the cloud system combing with PKI mechanism. At last, a comprehensive and detailed security analysis of the proposed scheme in cloud computing is provided. ? (2014) Trans Tech Publications, Switzerland. |
语种 | 英语 |
出处 | http://dx.doi.org/10.4028/www.scientific.net/AMM.484-485.986 |
出版者 | TRANS TECH PUBLICATIONS LTD |
内容类型 | 其他 |
源URL | [http://dspace.xmu.edu.cn/handle/2288/86870] |
专题 | 信息技术-会议论文 |
推荐引用方式 GB/T 7714 | Jiang, Xing Chen,Zheng, Jian De,Zheng JD. An indirect fingerprint authentication scheme in cloud computing. 2014-01-01. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论