By: KV Sai Mounish, Department of computer science and technology, Student of computer science and technology, Madanapalle Institute Of Technology and Science, 517325, Angallu, Andhra Pradesh.
ABSTRACT –
It is irrespective of storage of data in our devices that cloud computing will be extremely useful for which will help to improve the security of sensitive or personal information. Even formats like the password or PIN have become insecure and easily manipulatable now-a-days. To this end, biometric security will be offering secure protection to cloud services. Well, therefore this article is a documentation of how biometric authentication works such as facial recognition, fingerprint recognition and voice recognition. The integration of cloud security with the biometric security will offer many gains including the better work on access control, the reduction of frauds, convenient using and so on Together, this article will point out the challenges faced in adopting the cloud like privacy issues, data breaches and so on Now, the aim of the article is to enhancing the level of cloud computing security to stay data still and also the confidence in cloud application.
KEYWORDS –
Cloud computing, Biometric security, Robust, Fingerprint, Privacy, Data breaches, Password.
INTRODUCTION –
One of the most important applications of cloud computing is the usage of cloud storage and its management that greatly increases the security of the personal or top-secret information for the users. As the amount of stored data is shifting towards cloud solutions the problem of security and protection against various threats grows significantly. The common modes of authentication even include the use of passwords and PINs though these have been seen to be weak and highly susceptible to hacks and data spills. Some of these traditional security measures are not effective in preventing the new security threat hence the need for better and more efficient security measures.
Thus, identification by the use of physiological and/or behavioral features of individuals is a secure substitute to conventional access mechanisms[1]. Facial recognition, fingerprint recognition, voice recognition technologies offer a better level of security to the system since they allow access only to the user deep inherent traits that cannot be easily imitated. Using the concept of biometric authentication and implementing it on cloud platform, the end users will be provided a secured environment and a better user interface.
In this article, the author has articulated on the subject of biometric security in cloud computing with especial reference to understanding how biometric authentication mechanism function and why they could be effective in increasing security in clouds. The adoption of biometric security to cloud services brings numerous advantages consistent of improved access, less fraud, and a more convenient interface with the cloud services. Nevertheless, the integration of piece biometric technologies also has some issues mainly regarding to the privacy and security.
In general, we will speak about one of the components of biometric system, such as the biometric authentication; the technologies to be discussed will be the facial recognition, the fingerprint recognition, and the voice recognition. Also, we will examine the issues with the protection of biometric data and define the privacy issue and biometric data leakage threat. Thus, in accomplishing this, the article aims at explaining that there is hope to be derived from biometrics with regard to providing a positive change in security of cloud computation, data authenticity, with the general public gaining confidence in cloud-based solutions.
According to the mentioned approaches, the primary aim of this article is to address the improvement of Cloud computing security and its relation to the incorporation of biometric technologies[2]. Thus, it is possible to show the positive effect of some of this advancement on keeping security of the data and enhance the trust in cloud applications.
This paper therefore presents the background information necessary as well as the matters to be addressed in this particular article as the focus shifts to the biometric security in cloud computing.
Combining Biometric Security with Cloud Computing
- Biometric security is a boost when implemented in the facets of cloud computing means in as far as it strengthens the protection of data stored and in the same regard, the ease of retrieving data on the cloud. This part explains what is understood by the term biometric authentication with reference to the cloud.
- A core characteristic which can be noted about traditional biometric based on its application is that biometric authentication takes place in the different clouds.
- Biometric authentication is the confirmation of an individual’s identity based on physiological and/or behavioral characteristics that are both objective and measurable such as fingerprints, facial coat and speaking style respectively[3]. When integrated with cloud computing, biometric authentication can be implemented in various ways: Looking at the future possibilities of integrating biometric authentication when used with cloud computing the following possibilities emerge:
- Biometric Data Enrollment: In this method, initially the users’ physical characteristics data such as fingerprint face recognition, etc., get saved in a database. This data is often encrypted then is stored in a cloud database to make it rather tough for any person who is not expected to view it, to actually view it.
- Biometric Data Storage and Management: Issues to do with storage and programming of the biometric information are handled by the cloud infrastructure. Biometric data are protected from development to storage by complex measures that slow down the realization of violation and unauthorized access.
- Authentication Process: It becomes essential when a user attempts to make a request for some specific cloud service; here, for instance, biometric can be a sensor that is a fingerprint scanner or a camera[4]. The same cloud system then proceeds to search the stored biometric templates in accordance with the data given, in order to check for the corresponding identities.
- Access Control and Authorization: Moreover, cloud service uses identification and the roles that are unique to the user and then grants him or her access. This process implies that only the desired user shall be the only one who shall receive the relevant data and or services.
The process which will be taking in biometric authentication integrated with cloud security is shown in Figure 1.
Benefits and Challenges Faced
Coming to benefits it has following: As for the benefits it has following:
Enhanced Security
Unique Identifiers: Finger prints, facial identity, voice identity and even the retina scan of any person cannot be replicated by anybody else this makes it hard for the unauthorized personnel to access the system.
Reduced Risk of Theft:
Regarding password and PINs one can steal it, guess it or even share the PIN but the biometric data do not hold these disadvantages. This lowered the likelihood for people to log in especially if passwords have been pirated or if the user name and passwords have been captured.
Improved Access Control
Accurate User Verification: Biometric hinders the unauthorized persons from accessing the system due to the fact that they cannot be allowed to use their fingerprints to operate the system. Such accuracy is specifically important in prevention of wrong people from accessing hence permitting only the rightful owners to have access to a certain data or service.
It also has different challenges in same way some of them are mentioned below: It also posed different challenges in the same way as some of them are stated below:
Privacy Concerns: Especially, Biometric data’s are of high sensitivity.
It also means that the biometric data is always personal, as well as, usually sensitive since it is dealing with the subject’s physiological properties. Due to personal nature of most of the data that is being collected, stored and used in organizations, most people can always have that discrete feeling of being uncomfortable or even violated since they cannot dictate how managers will use that data. Concerning the application of the biometric information, users are either interested in how it is incorporated, or the safety of their information[4].
Regulatory Compliance: Every country and in certain cases cities have their laws and policies concerning the collection or use of biometric data like (GDPR) in Europe (CCPA) in California[5]. That at times it may not be convenient to follow the above regulations and that there has to be well set measures on enhancing protection of data.
CONCLUSION –
Thus, biometric security integrated with cloud computing has giant impact toward protecting the strategic and personal data and also facilitates in the process of authorization. Depending on characteristics of individuals it plays a pivot role and; therefore, it becomes very hard for intruders to penetrate in this security system. Where we see advantages such as enhanced access control, prevention of fraud, it is also possible to see some difficulties which are the problem when using such as privacy which will harm the compliance with standards so while dealing with biometric security concerning cloud computing it is essential to solve all these difficulties to establish confidence so as to reduce risks associated with traditional methods of authentication. Thus, while integrating into cloud computing and encouraging its integrity for protection of sensitive data in it, biometric authentication will remain in tact and will have a major role to play. Thus, based on the analysis it would be correct to conclude that the role of biometric security in cloud computing cannot be overemphasized. If one tries to sort out challenges that are related and if one takes best practices one can see that the biometric security has a great hold in cloud storage it is not only going to enrich the data it’s also going to create trust and confidence in cloud computing services.
REFERENCES –
- W. Yang, S. Wang, N. M. Sahri, N. M. Karie, M. Ahmed, and C. Valli, “Biometrics for Internet-of-Things Security: A Review,” Sensors, vol. 21, no. 18, Art. no. 18, Jan. 2021, doi: 10.3390/s21186163.
- P. Melzi, C. Rathgeb, R. Tolosana, R. Vera, and C. Busch, “An Overview of Privacy-Enhancing Technologies in Biometric Recognition,” ACM Comput Surv, May 2024, doi: 10.1145/3664596.
- B. Meden et al., “Privacy–Enhancing Face Biometrics: A Comprehensive Survey,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 4147–4183, 2021, doi: 10.1109/TIFS.2021.3096024.
- M. Rahaman, C.-Y. Lin, P. Pappachan, B. B. Gupta, and C.-H. Hsu, “Privacy-Centric AI and IoT Solutions for Smart Rural Farm Monitoring and Control,” Sensors, vol. 24, no. 13, Art. no. 13, Jan. 2024, doi: 10.3390/s24134157.
- C.-Y. Lin, M. Rahaman, M. Moslehpour, S. Chattopadhyay, and V. Arya, “Web Semantic-Based MOOP Algorithm for Facilitating Allocation Problems in the Supply Chain Domain,” Int J Semant Web Inf Syst, vol. 19, no. 1, pp. 1–23, Sep. 2023, doi: 10.4018/IJSWIS.330250.
- Li, K. C., Gupta, B. B., & Agrawal, D. P. (Eds.). (2020). Recent advances in security, privacy, and trust for internet of things (IoT) and cyber-physical systems (CPS).
- Chaudhary, P., Gupta, B. B., Choi, C., & Chui, K. T. (2020). Xsspro: Xss attack detection proxy to defend social networking platforms. In Computational Data and Social Networks: 9th International Conference, CSoNet 2020, Dallas, TX, USA, December 11–13, 2020, Proceedings 9 (pp. 411-422). Springer International Publishing.
Cite As
Mounish K.V.S. (2024) Importance of Biometric Security in Cloud Computing, Insights2Techinfo, pp.1