A Two Level-Security Model for Cloud Computing based on the Biometric Features and Multi-Level Encryption
Proceeding: International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)Publication Date: 2015-1-28
Authors : Mohammad V. Malakooti; Nilofar Mansourzadeh;
Page : 100-111
Keywords : Cloud Computing; Data Security; Data Integrity; Availability; Depsky Model; Bioemtric; SVD;
Abstract
Cloud computing is a well-known subject in IT system and is based on network and computer utilities. Cloud computing is the main source of storage facilities for small, medium and large companies in recent years. Since, many customers look for cloud computing facilities and services, thus the security of information must be guaranteed to give a full confidence for that customer who has trusted to use these facilities and ready to store their valuable information on the cloud computing and distributed networks. The fundamental problem in cloud computing is the security of the stored data. This paper describes the process of storing the images and scanned documents over the cloud by using our proposed security model which is based on the biometric features and multilevel encryption. On the other hand, it will discuss about cloud computing environment, issues and concerns regarding to security, authentication by using biometric features, and new security algorithms and models. The Security algorithms, which are used in this paper, are consisting of the scrambling algorithm and two level encryption methods. In addition, we have proposed two different scenarios that improve the DEPSKY model. Biometrics is the knowledge of setting the identity of an individual related to the inherent physical or attitude characteristics connected with the person. The relationship between the perceived authentication content and perceived content of biometric features is studied. The process of developing the algorithms and the model is documented in the proposed section.
Other Latest Articles
- Multiple Description Transform Coding Comparison for Multiresolution Image Representation
- Empirical Model for LTE Outdoor Planning Using a Hybrid Approach: Measuring and the Genetic Algorithm Technique
- Prediction Metrics in Indoor Wireless Networks Considering Multimedia Applications: a Bayesian Approach
- Have WLAN networks outgrown their usefulness? A viability study of WLAN Networks in DenseNets: An Analysis based on QoS/QoE and Handover
- A Multi-level Spreading Code to Suppress Noise Enhancement in Zero-Forcing Equalization for Direct-Sequence Spread-Spectrum Communication
Last modified: 2015-01-28 22:04:31