Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on BioMetric Authentication Methods

Pawan Kumar Patidar, Pujil Khanna

Abstract


Cloud computing has constrained profession to abandon the conventional way of sharing IT assets because of numerous elements including cost, profitability, execution, vulnerabilities and security. The advantages of cloud computing are incredible, yet it's a complex technology that requires complex human identification proof standards for explicit applications on the system. Biometric confirmation gives one of the most encouraging approaches to validate in a cloud situation. This paper is an exact audit that outlines the most recent procedures that have been utilized for genuine biometric approval of distributed computing and features their points of interest and inconveniences to locate the most ideal route for this reason. The aftereffect of this examination has given that multimodal biometric verification improves and decreases its unpredictability and time multifaceted nature of Biometric-as-an administration (Baas).


Full Text:

PDF

References


Mahnoush Babaeizadeh, Majid Bakhtiari, Alwuhayd Muteb Mohammed. Authentication methods in cloud computing: A survey. Research Journal of Applied Sciences, Engineering and Technology. 2015; 9 (8): 655–664.

Shabir Ahmad, Bilal Ehsan. The Cloud Computing Security Secure User Authentication Technique (Multi Level Authentication). International Journal of Scientific & Engineering Research, IJSER. 2013; 4 (12): 2166–2171.

Chimere Barron, Huiming Yu, Justin Zhan. Cloud computing security case studies and research. Proceedings of the World Congress on Engineering, July 3–5, 2013. II: 16.

4. Hongwei Li, Yuanshun Dai, Lian Tian, Haomiao Yang 2009. Identity-based authentication for cloud computing. Cloud Computing. 5931: 157–166.

5. L.C Araujo, L.H. Sucupira, M.G. Lizarraga, L.L. Ling, J.B.T. Yabu-uti, 2005. User authentication through typing biometrics features. IEEE Transactions on Signal Processing, 53 (2): 851–855.

S. Shunmugam and R. Selvakumar, "Electronic transaction authentication—A survey on multimodal biometrics". 2014 IEEE International Conference on Computational Intelligence and Computing Research. 18–20 December 2014; Coimbatore, India. US: IEEE Press; 1–4 p.

7. Salman H. Khan, M. Ali Akbar, Farrukh Shahzad, et, al. Secure biometric template generation for multi-factor authentication. Pattern Recognition. 2015; 48 (2): 458–472. Mahnoush Babaeizadeh, Majid Bakhtiari, Alwuhayd Muteb Mohammed. Authentication methods in cloud computing: A survey. Research Journal of Applied Sciences, Engineering and Technology. 2015; 9 (8): 655–664.

8. Chimere Barron, Huiming Yu, Justin Zhan. Cloud computing security case studies and research. Proceedings of the World Congress on Engineering, July 3–5, 2013. II: 16.

9. Nileshree R. Darve, Deepti P. Theng. Comparison of biometric and nonbiometric security techniques in mobile cloud computing. 2015 2nd International Conference on Electronics and Communication Systems (ICECS 2015). 26–27 February 2015; Coimbatore, India. US: IEEE, 213–216.

Salman H. Khan, M. Ali Akbar, Farrukh Shahzad, et, al. Secure biometric template generation for multi-factor authentication. Pattern Recognition. 2015; 48 (2): 458–472.

10. Hongwei Li, Yuanshun Dai, Lian Tian, Haomiao Yang 2009. Identity-based authentication for cloud computing. Cloud Computing. 5931: 157–166.

11. Roulgouris Nikolaos V., Plataniotis Konstantinos N., Micheli-Tzanakou Evangelia. "A comparative survey on biometric identity authentication techniques based on neural networks" in Biometrics: Theory Methods and Applications, pp. 47–79, 2009.

S. Shunmugam and R. Selvakumar, "Electronic transaction authentication—A survey on multimodal biometrics". 2014 IEEE International Conference on Computational Intelligence and Computing Research. 18–20 December 2014; Coimbatore, India. US: IEEE Press; 1–4 p.

W. Meng, D.S. Wong, S. Furnell and J. Zhou, "Surveying the development of biometric user authentication on mobile phones", IEEE Communications Surveys & Tutorials. 3rd Quarter 2015; 17 (3): 1268–1293.


Refbacks

  • There are currently no refbacks.