Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

Secure Crypto-Biometric System for

Cloud Computing using HMM(hidden


Markov model) algorithm
By T Sarath Srinivas, Bhanu Kiran, Prajwal, and Hasvanth
Abstract
• Cloud computing has achieved maturity, and there is a heterogeneous
group of providers and cloud-based services. However, significant
attention remains focused on security concerns. In many cases,
security and privacy issues are a significant barrier to user acceptance
of cloud computing systems and the advantages these offer with
respect to previous systems
• To overcome those problems in this paper, we propose a
cryptobiometric system applied to cloud computing in which no
private biometric data are exposed
Introduction
• Cloud computing is a trend in application architecture and
development, as well as a new business model. The success of many
service providers, with Amazon as a remarkable example, has
demonstrated that the model can be applied to a wide variety of
solutions, covering the different levels defined in the cloud paradigm
(SaaS, PaaS and IaaS). We can consider that cloud computing is at a
mature stage, although there remain some limitations and challenges.
Literature Survey
• Extensive research in the field of biometrics and cryptography has laid
the foundation for our project. We have reviewed existing literature
on biometric authentication, cryptographic algorithms, and their
applications in cloud security. Our findings indicate a growing interest
in integrating these technologies to enhance cloud security.
Project Overview
• Our project aims to develop a secure authentication system for cloud
computing environments. By integrating cryptographic algorithms for
data encryption and biometric authentication for user verification, we
seek to provide a robust solution that ensures both security and
usability in accessing cloud-based services.
Methodology
• Our methodology involves several key steps: 1. Selection of
appropriate cryptographic algorithms for data encryption. 2.
Integration of biometric authentication methods such as fingerprint
recognition or facial recognition. 3. Development of an interface for
user interaction and system management. 4. Testing and validation of
the system's security and usability.
Results
• Preliminary results indicate promising outcomes in terms of security
and user experience. Our system successfully encrypts data using
advanced cryptographic techniques and accurately verifies user
identities through biometric authentication. Further testing and
refinement are underway to enhance the system's performance and
reliability.
Conclusion
• In conclusion, our project presents a secure crypto-biometric system
for cloud computing that addresses the inherent security challenges
associated with traditional authentication methods. By leveraging
cryptography and biometrics, we offer a robust solution that
enhances both security and user convenience in accessing cloud-
based services.
References
• 1. Author A, et al. (Year). Title of Paper. Journal Name, Volume(Issue),
Page Numbers. 2. Author B, et al. (Year). Title of Paper. Conference
Name, Page Numbers.
• 2.David Gonzalez MartFrancisco Javier Gonzalez Casta ´ no ˜
Telematics Engineering Department University of Vigo Vigo, Spain
david.gonzalez@det.uvigo.es javier@det.uvigo.es

You might also like