ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Two Level-Security Model for Cloud Computing based on the Biometric Features and Multi-Level Encryption

Proceeding: International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)

Publication Date:

Authors : ; ;

Page : 100-111

Keywords : Cloud Computing; Data Security; Data Integrity; Availability; Depsky Model; Bioemtric; SVD;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing is a well-known subject in IT system and is based on network and computer utilities. Cloud computing is the main source of storage facilities for small, medium and large companies in recent years. Since, many customers look for cloud computing facilities and services, thus the security of information must be guaranteed to give a full confidence for that customer who has trusted to use these facilities and ready to store their valuable information on the cloud computing and distributed networks. The fundamental problem in cloud computing is the security of the stored data. This paper describes the process of storing the images and scanned documents over the cloud by using our proposed security model which is based on the biometric features and multilevel encryption. On the other hand, it will discuss about cloud computing environment, issues and concerns regarding to security, authentication by using biometric features, and new security algorithms and models. The Security algorithms, which are used in this paper, are consisting of the scrambling algorithm and two level encryption methods. In addition, we have proposed two different scenarios that improve the DEPSKY model. Biometrics is the knowledge of setting the identity of an individual related to the inherent physical or attitude characteristics connected with the person. The relationship between the perceived authentication content and perceived content of biometric features is studied. The process of developing the algorithms and the model is documented in the proposed section.

Last modified: 2015-01-28 22:04:31