• DocumentCode
    686404
  • Title

    Achieving robust biometric based access control mechanism for cloud computing

  • Author

    Kun Huang ; Jiangyong Shi ; Ming Xian ; Jian Liu

  • Author_Institution
    State Key Lab. of Complex Electromagn. Environ. Effects on Electron. & Inf. Syst., Nat. Univ. of Defense Technol., Changsha, China
  • fYear
    2013
  • fDate
    22-24 Nov. 2013
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    Cloud computing is an arresting emerging computing paradigm that offers users on demand network access to a large shared pool of computing resources. This paper focuses on leveraging biometric identity to achieve access control in cloud. Biometric possesses a lot of advantages like portability, uniqueness and verification clearness; nevertheless biometric measurements are always noisy. Additionally, there always exists key exposure problem in the context of access control. To protect sensitive data along with private key confidential against malicious servers or other external attackers and meet the requirement of removing the biometric noisy property, we exploit and combine techniques of fuzzy identity based encryption (FIBE), biometric measurement, and key insulated encryption. Specifically, we based on the idea that every time legal user or malicious one makes the request of accessing data of his interest will the cloud severs update the corresponding header file which only the legal user has the ability to decrypt. To our best knowledge, it is the first to consider the key insulated encryption in the access control of cloud computing. Extensive analysis shows that our proposed scheme is provably secure under existing security models.
  • Keywords
    authorisation; biometrics (access control); cloud computing; cryptography; robust control; FIBE; biometric measurements; biometric noisy property; biometric possesses; cloud computing paradigm; cloud severs update; computing resources; demand network access; every time legal user; extensive analysis; fuzzy identity based encryption; key insulated encryption; leveraging biometric identity; malicious servers; portability; private key confidential; robust biometric based access control mechanism; security models; sensitive data; verification clearness; Access Control; Biometric; Cloud Computing; Fuzzy Identity Based Encryption; Key Insulated Encryption;
  • fLanguage
    English
  • Publisher
    iet
  • Conference_Titel
    Information and Network Security (ICINS 2013), 2013 International Conference on
  • Conference_Location
    Beijing
  • Electronic_ISBN
    978-1-84919-729-8
  • Type

    conf

  • DOI
    10.1049/cp.2013.2471
  • Filename
    6826020