DocumentCode :
686404
Title :
Achieving robust biometric based access control mechanism for cloud computing
Author :
Kun Huang ; Jiangyong Shi ; Ming Xian ; Jian Liu
Author_Institution :
State Key Lab. of Complex Electromagn. Environ. Effects on Electron. & Inf. Syst., Nat. Univ. of Defense Technol., Changsha, China
fYear :
2013
fDate :
22-24 Nov. 2013
Firstpage :
1
Lastpage :
7
Abstract :
Cloud computing is an arresting emerging computing paradigm that offers users on demand network access to a large shared pool of computing resources. This paper focuses on leveraging biometric identity to achieve access control in cloud. Biometric possesses a lot of advantages like portability, uniqueness and verification clearness; nevertheless biometric measurements are always noisy. Additionally, there always exists key exposure problem in the context of access control. To protect sensitive data along with private key confidential against malicious servers or other external attackers and meet the requirement of removing the biometric noisy property, we exploit and combine techniques of fuzzy identity based encryption (FIBE), biometric measurement, and key insulated encryption. Specifically, we based on the idea that every time legal user or malicious one makes the request of accessing data of his interest will the cloud severs update the corresponding header file which only the legal user has the ability to decrypt. To our best knowledge, it is the first to consider the key insulated encryption in the access control of cloud computing. Extensive analysis shows that our proposed scheme is provably secure under existing security models.
Keywords :
authorisation; biometrics (access control); cloud computing; cryptography; robust control; FIBE; biometric measurements; biometric noisy property; biometric possesses; cloud computing paradigm; cloud severs update; computing resources; demand network access; every time legal user; extensive analysis; fuzzy identity based encryption; key insulated encryption; leveraging biometric identity; malicious servers; portability; private key confidential; robust biometric based access control mechanism; security models; sensitive data; verification clearness; Access Control; Biometric; Cloud Computing; Fuzzy Identity Based Encryption; Key Insulated Encryption;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Information and Network Security (ICINS 2013), 2013 International Conference on
Conference_Location :
Beijing
Electronic_ISBN :
978-1-84919-729-8
Type :
conf
DOI :
10.1049/cp.2013.2471
Filename :
6826020
Link To Document :
بازگشت