SlideShare a Scribd company logo
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Securing Mobile Cloud Using Finger Print
Authentication
IehabALRassan, HananAlShaher
Department of Computer Science,King Saud University,Riyadh, Saudi Arabia

ABSTRACT
Mobile cloud computing becomes part of mobile users daily life transactions. Mobile devices with Internet
capabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobile
devices, these devices can't install and run applications require heavy CPU processing or extensive
memory. Cloud computing allows mobile users to synchronize their data with remote storage and utilize
applications require heavy CPU processing or extensive memory such as Microsoft Office or Adobe
Photoshop, as they run in a desktop computer.
The combination of cloud computing and mobile computing introduces mobile cloud computing, which also
present new issues of security threats such as unauthorized access to resources exist in mobile cloud.
Protecting mobile cloud computing from illegitimate access becomes an important concern to mobile users.
This paper proposes and implements a new user authentication mechanism of mobile cloud computing
using fingerprint recognition system. Fingerprint images of mobile users can be captured and processed
using mobile phone camera to access mobile cloud computing . The implementation of the proposed
solution in different mobile operating systems and devices show security enhancement in mobile cloud
computing with accepted performance level.

KEYWORDS
Mobile cloud computing, Wireless Network, Mobile Network, Mobile devices, Cloud computing, Finger
print authentication

1. INTRODUCTION
The ability to access data and applications from anywhere and at any time with low cost arethe
most important benefits of mobile cloud computing. The primary security issue on mobile cloud
computing is protecting remote data and applications from illegitimate access. While authorized
users can access the data, the cloud provider can also do so. There is also the possibility of
unauthorized access, which is access by third parties such as hackers. Therefore, the security issue
in mobile cloud computing becomes one of the top areas for research [1, 2]. In tradition, cloud
computingusers can avoid the security risk by just encrypting the data before it is sent and stored
in the cloud. However, this is not the case with the mobile users, because encryption technology
is not suitable for mobile devices due to the encryption process, which requires high workload
and high CPU processing[2].In this paper a new mechanism is proposed and implemented to
authenticatemobile cloud computing by using fingerprint recognition as part of the security
solution. Improving the mechanism of protecting access to the mobile cloud leads to improving
the security overall, which at least protects the mobile cloud from unauthorized access. This
section starts with an introduction to mobile cloud computing and describes the concept of mobile
cloud computing. The rest of the paper is organized as follows: section2 provides a literature
review about security solutions on mobile cloud. In section3 and 4 respectively, present the
proposed approach as design and experimental results. At the end, conclusion is given in section5.
DOI : 10.5121/ijnsa.2013.5604

41
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

1.1. The Mobile Revolution
Portability is an added value to computer devices that almost everyone looks for, either at work or
at home, along with the preservation of processing power and local data storage. That is
illustrated by the growing number of laptops users rather than PCs users and that's why the
functionality of mobile phone has been changed.
Initially, the basic function of mobile phoneswasto make conversation calls. Nowadays,this
becomes a trivial function sincemost of mobile usersneed to browse the Internet and do their
online transactions while they are in the move. Thus, the form and the function of mobile phones
have been changed. Indeed, functionality of the mobile phone closely resembles that of a personal
computer; therefore,people cannot ignore the mobile world and the daily impact of transactional
activity of mobile technology. This appears obviously in the increasing of number of users of
mobile phones, which provide Internet access and built-in computing applications [3, 4, 5].
Mobile users can eliminate some of the constraints of the traditional computing environment,
such as power, space, cost, and time, by combining pre-existing technologies to create an
environment and call it cloud computing. Also, if we can make the core technology in new
environment, we can create virtualization to allow more flexibility, in which the same physical
resources are shared virtually with multi OS. As a result, we well take the advance in processors
and storage, reducing the cost of service and increasing the speed. This adds new value that any
company is looking for in services. And that leads to say the cloud is a more compelling solution
and the evolution of the Internet in the near future will be toward cloud computing [6, 7, 4].
Accessing the Internet through mobile devices has become an everyday event for most of mobile
users, and these devices allow users to synchronize data from or to their PCs. However, due to
hardware limitations, these devices can't install and run software such as Microsoft Office or
Adobe Photoshop. As an alternative, cloud computing allows users to overcome these limitations
and becomes the future of mobile computing [3].
Indeed, accessing the cloud with a mobile device has created a new concept called mobile cloud
computing (MCC). Data will be available not only at home or at the office, but it can easily be
accessed from the cloud with a mobile device and manage your data from anywhere. Mobile
devices take data out of homes and offices and put them in our pockets [3].
If clients of mobile cloud computing have an Internet connection, they can accomplish their work
simply. Anyway, with all of the advantages provided by mobile cloud computing, security still
remains an important issue [5].

2. LITERATURE REVIEW
In the cloud computing environment, users use an authentication system to utilize the cloud
servicesthrough a Web-based user interface, either a web browser or a mobile application, or a
web service application programming interface (API). Authentication on the cloud is necessary to
provide secure access to the cloud services by authorized users only. At present, authentication is
done in different methods, such as a simple text password [12].
In the next subsections, a review of some existing authentication systems, which are based on
client-server architecture. These existing authentication systems are provided by cloud computing
providers, third-party providers, and as literature.

42
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

2.1 Literature
There are several proposed strong user authentication provided by researchers to improve mobile
cloud security. Omri et al. in [5] introduced an application that uses handwriting recognition as an
authentication system to secure access in mobile cloud. In this way, the user is identified by
password and unique handwriting style. This application, which used the mobile phone as a
biometric-capture device, also used Hadoop (Apache Hadoop is an open-source software that
provides applications both reliability and data motion) to establish the connection between
mobile user and the cloud via Internet. It has been implemented into two ways. The main
difference is in the implementation mode, one as web page and the other as mobile application.
In [13], suggested using quick response code (QR code) for a user authentication system in the
mobile cloud. In this system, the user ID, password, and the user's image are converted into QR
code. In the multilevel authentication system proposed in [12], this authentication system
generates and authenticates the password at multiple levels to access the cloud services. Access to
the cloud is allowed if authentication is successful in all levels.
• First level of authentication is the organization level. This level reads the organization
password; if unauthenticated they are going to terminate. If it is authenticated, then it enters a
second-level authentication.
• Second level of authentication is the team level. This level reads the team password; once
authentication is done, it then enters a user-level authentication.
• Last level is the user level. This level reads the user password to provide the user privileges
and permission.
In [11], a strong user authentication system was proposed for cloud computing; this system
verifies user authenticity via password, smartcard, and out of band authentication. In 2011, Chen,
et al. [10] proposed an extension of Yang and Chang [14]. Chen adds a password protectionbased mechanism with dynamic ID to provide authentication to ensure user legality.
As seen in this section, there are a few proposed systems in the literature for mobile cloud, but for
regular cloud there are many proposed schemes that are good for improving security in regular
cloud, but in the mobile cloud it's so hard for users because of its lack of usability.
The balance between security and usability must be found [9], just as when trying to apply the
authentication system from a traditional client server to cloud computing. It can be applied, but it
has a high risk because the infrastructure in the cloud is shared among users and managed by the
cloud providers.

2.2.Cloud computing providers
Cloud providers are divided into three parts, depending on the type of the service provided:
1.Software as a Service (SaaS)—the users can access an application remotely via the Internet.
2.Platform as a Service (PaaS)—users can create an application to meet their needs and then
deploy it on the cloud.
3.Infrastructure as a Service (IaaS)—users can rent servers, networking components, hardware,
and storage.
Indeed, when reviewing most cloud providers, perhaps all- have the same authentication system
based on user ID or email and password, whether the service provided is critical or not.

43
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

2.3. Third Party
Some companies prepare authentication systems as a service to access the cloud. Any services
provided by companies other than the cloud provider are called third-party providers. Recently,
many of mobile device fingerprint hardware solutions are provided by companies such as Grabba,
S.I.C. Biometrics, and Fulcrum biometrics. Other companies provide software with strong
authentication system using input either from external hardware or from the software itself. Also,
there are many companies providing solutions such as web services and software development
kits (SDK) for developers to create and integrate an authentication system to help the end users.
But in this research we focus on products forwarded to the end users as a ready product to use.
As seen in the literature review, the lack of existing mobile user authentication systems is the
main motivation to improve the mobile cloud security through strengthen the authentication
system.

2.4. Related works
A few researchers have studied how to extract a fingerprint image from digital camera. [15, 16]
have shown that is possible to extract a fingerprint by using a low-cost webcam when applying
different preprocessing and image enhancements approaches. [17] suggested a preprocessing
approach for fingerprint recognition.
In [18], they present fingerprint image preprocessing approaches based on a whole-hand image
captured by digital camera. This method starts with locating a key point location from the hand
contour image. Then the middle finger is segmented from the hand image to extract fingerprint
from it.
In [19], they used a monochrome digital camera and, to reduce the noise in the fingerprint image,
they used a low-pass filter, then feature extraction is based on block mean value and block
coherence analysis. In [20], they use a strong view difference image rejection method to convert
the 3D to a 2D image, and then use the core point detection algorithm to obtain the minutiae
points.
Feature extraction based on region growing method, frequency information and color distribution
information is used in [21], and then, to do orientation estimation, they apply the iterative robust
regression method.
In [22], the segmentation is done by skin color detection and then enhanced by using the shorttime Fourier transform analysis; after that the core point is detected.

44
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Fig.1. The Proposed Design Soltion

3.THE DESIGNED APPROACH
In this section, the proposed authentication mechanism using fingerprint recognition to secure
access in mobile cloud is explained. Recently, there have a few works about using a digital
camera or a webcam as a sensor, but in literature only. Embedding a special fingerprint sensor or
adding external hardware as a fingerprint reader will be costly and will influence the mobile
simplicity. Utilizing the existing camera in a mobile phone to capture fingerprint images as a
biometric sensor is inexpensive to implement. The proposed solution is using a fingerprint
recognition system to obtain the fingertip image through the mobile phone camera.
The aim is to convert fingertip image obtained by mobile phone camera to fingerprint image and
extract ridge structure from it to be as similar as possible with the ridge structure gained from
fingerprint sensor. Of course, mobile camera can't convert the image to be like the output image
obtained and processed by using fingerprint sensor, but at least this process aim to export an
acceptable output. Figure 1 shows the proposed design soltion and how it works.
Save or store fingerprint image on mobile device is not requirement, due each time user want
access the cloud capture a new fingerprint image and login, as simple as. The whole approach was
hosted on cloud to take all benefit from it (all processes and storage was there). As a developer
account on a cloud provider has all privileges to create and maintain customize database as well
as their applications. The database provided with Platform as a Service (PaaS) from cloud
provider.

45
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

3.1.The proposed algorithm
Initially, in the enrollment phase the user presents the fingertip to the mobile phone camera to
obtain a fingerprint sample and extracted features by pre-processing the sample. Then, it is stored
in a database for comparison to verify the identity of the user. After take a fingerprint image as
input on login form, preprocessing image function working to extract features then matching
function start to match between these features with features were stored in database. If matching
succeeded, then user accepted otherwise user rejected. The similarity score (S) is the result of the
comparison between the extracted features and features stored in a database.
If (S is low value) then
Little similarity
If (S is high value) then
High similarity
After that, the decision will be based on the similarity score (S), which is compared to a
predefined threshold (T).
If (S > T) then
The user is accepted
Else if (S < T)
The user is rejected [23].

4.EXPERIMENTAL RESULTS AND DISCUSSION
The tests were separated into two parts:
•
•

Functionality
Performance

4.1 Evaluation Functionality
This section evaluates each function in the pre-processing class. All functions (convert to grayscale, filtering, etc.) gave positive test results. Figure 2 summarizes the output from various
functions, including (a) the original image, (b) convert to gray-scale, (c) edge enhancement, (d)
filtering, (e) binarization, (f) thinning, (g) map direction, and (h) minutiae extraction.

46
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Figure 2: Functions - Output for Galaxy Note

4.2.Evaluation Performance
In this section, the process time is calculated for each function to test if the performance rate is
acceptable according to the rates established by the National Institute of Standards and
Technology (NIST). Figures 3,4 and5show the process time from testing the fingerprint images
for the Sony Xperia S and the Samsung Galaxy S3 devices.

4.3.Conclusions from the test results
From the results presented, the following conclusions can be noticed:
-

The proposed solution is not only to secure unauthorized access, but also to protect databases
from injection attacks due to the absence of string input from users. The fingerprint image is
the only input from the user in accordance with the interface design. No other input is
permitted from the user to enter the system.
- The interface in this solution is based on HTML5, which is a cross-platform and has been
tested on different mobile platforms.
- With the addition of some filters to segment the method in this solution, it will be able to
work with web cameras.
- When work on fingerprint images as parabolic curves (parabola), it is easy to extract a static
and accurate center point.
- Different company mobile devices that's mean different quality, resolution and size of
images. In testing take this in account to prove the proposed solution should work successful
with it.
Figure 3 shows the experiment results of the fingerprint image taken with the Sony Xperia S
device, which recorded 0.9 seconds as the maximum time and 0.4 seconds as the average.
Figure 4 illustrates the process time for an image taken with a Samsung Galaxy S3 device; the
maximum time is 2.4 seconds and the average is 0.5 seconds.

47
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Another example is the BlackBerry Z in Figure 5, with approximately 4 seconds as a maximum
time and 0.8 seconds as the average recorded time.

Sony Xperia S
00:01.7
00:01.6
00:01.4
00:01.2
00:01.0
00:00.9
00:00.7
00:00.5
00:00.3
00:00.2
00:00.0
Convert to Gray

10
00:00.7

9
00:00.0

8
00:00.0

7
00:00.0

6
00:00.0

5
00:00.0

4
00:00.0

3
00:00.0

2
00:00.0

1
00:00.0

Edge Enhancement

00:00.5

00:00.4

00:00.6

00:00.5

00:00.4

00:00.5

00:00.9

00:00.5

00:00.5

00:00.4

Filtering

00:00.2

00:00.1

00:00.9

00:00.1

00:00.1

00:00.1

00:00.1

00:00.1

00:00.1

00:00.7

Binarization

00:00.1

00:00.1

00:00.1

00:00.2

00:00.1

00:00.1

00:00.1

00:00.1

00:00.1

00:00.1

Thinning

00:00.4

00:00.4

00:00.3

00:00.4

00:00.4

00:00.4

00:00.4

00:00.3

00:00.5

00:00.2

Direction

00:00.2

00:00.2

00:00.2

00:00.1

00:00.2

00:00.2

00:00.2

00:00.2

00:00.3

00:00.2

Extracted

00:00.1

00:00.7

00:00.6

00:00.9

00:00.1

00:00.9

00:00.9

00:00.7

00:00.1

00:00.7

Time process

00:01.3

00:01.1

00:01.7

00:01.2

00:01.4

00:01.2

00:01.3

00:01.1

00:01.6

00:00.9

Figure 3: Time process for Sony Xperia S images

48
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Galaxy S3
00:01.0

00:00.9

00:00.7

00:00.5

00:00.3

00:00.2

00:00.0
Convert to Gray

10
00:00.9

9
00:00.6

8
00:00.2

7
00:00.7

6
00:00.9

5
00:00.6

4
00:00.2

3
00:00.7

2
00:00.7

1
00:00.5

Edge Enhancement

00:00.4

00:00.4

00:00.5

00:00.5

00:00.5

00:00.4

00:00.7

00:00.6

00:00.7

00:00.4

Filtering

00:00.1

00:00.1

00:00.2

00:00.2

00:00.1

00:00.1

00:00.2

00:00.1

00:00.2

00:00.1

Binarization

00:00.1

00:00.1

00:00.2

00:00.1

00:00.1

00:00.1

00:00.2

00:00.1

00:00.2

00:00.1

Thinning

00:00.4

00:00.4

00:00.7

00:00.4

00:00.4

00:00.5

00:00.6

00:00.5

00:00.4

00:00.5

Direction

00:00.2

00:00.2

00:00.2

00:00.2

00:00.2

00:00.3

00:00.8

00:00.2

00:00.2

00:00.4

Time process

00:00.9

00:00.1

00:00.1

00:00.1

00:00.1

00:00.1

00:00.2

00:00.9

00:01.0

00:00.1

Figure 4: Time process for Samsung Galaxy S3

BlackBerry Z
00:04.3
00:03.9
00:03.5
00:03.0
00:02.6
00:02.2
00:01.7
00:01.3
00:00.9
00:00.4
00:00.0
Convert to Gray

10
00:00.9

9
00:00.8

8
00:00.8

7
00:00.9

6
00:00.1

5
00:00.1

4
00:00.9

3
00:00.8

2
00:01.0

1
00:00.8

Edge Enhancement

00:00.1

00:00.1

00:00.1

00:00.2

00:00.1

00:00.9

00:00.1

00:00.9

00:00.9

00:00.9

Filtering

00:00.9

00:00.7

00:01.0

00:00.9

00:00.8

00:00.5

00:00.8

00:00.4

00:00.5

00:00.1

Binarization

00:00.4

00:00.4

00:00.4

00:00.5

00:00.4

00:00.3

00:00.3

00:00.2

00:00.3

00:00.3

Thinning

00:01.0

00:01.4

00:00.9

00:01.3

00:01.4

00:00.7

00:00.7

00:00.7

00:00.7

00:00.8

Direction

00:00.5

00:00.5

00:00.4

00:00.4

00:00.4

00:00.3

00:00.4

00:00.3

00:00.2

00:00.5

Extracted

00:00.3

00:00.3

00:00.2

00:00.2

00:00.2

00:00.2

00:00.3

00:00.1

00:00.2

00:00.3

Time process

00:03.6

00:03.8

00:03.2

00:03.9

00:03.2

00:02.3

00:02.8

00:02.2

00:02.1

00:03.0

Figure 5: Time process for BlackBerry Z

49
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

4.4 Discussion
The fingerprint images used in testing have a resolution of 72 dots per inch (dpi) which is less
than fingerprint images resolution (300 dpi) that captured from fingerprint sensors. From the
experiment results, it is evident that the range for the total processing time to pre-process a
fingerprint image takes between 1 and 12 seconds. Table 1 summarizes the range of process
times for each function in the pre-processing class. An acceptable enrollment time should be
equal to or less than two minutes, which means that the enrollment process must be
completed in 120 seconds. When the total process time is subtracted from the acceptable
enrollment time, there are 108 seconds remaining for enrollment. Figures 6 and 7 show the
enrollment process times in the proposed approach and how the proposed approach achieved
acceptable rates.
Table 1: Summary of Process Time

Function
Convert to Gray
Edge Enhancement
Filtering
Binarization
Thinning
Direction
Extracted
Total Time process

Range of time
process
0.1 - 1
0.1 – 1.2
0.1 - 1
0.1 – 0.9
0.1 – 1.4
0.1 – 0.9
0.1 – 1
0.7 – 11.9

Average
time
0.6s
0.5s
0.4s
0.3s
0.4s
0.2s
0.5s
1.9s

Figure 6 shows the process time of enrolment for six different mobile devices, and nearly all
are very similar. In addition, Figure 7 illustrates that 0.2 seconds is the minimum time, 19
seconds is the maximum, and 0.4 seconds is the average. This means that the proposed
approach achieved 19 seconds, with 108 seconds being the maximum acceptable time.

50
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

00:21.6

00:17.3

00:13.0

Galaxy S
Galaxy S3
Galaxy Note
Nokia 920
Sony

00:08.6

Ipad 3

00:04.3

00:00.0
10

9

8

7

6

5

4

3

2

1

Figure 6: The time of Enrollment Process
Enrollment Process Time
00:21.6

00:17.3

00:13.0

00:08.6

00:04.3

10

9

8

7

6

5

4

3

2

1

Galaxy S

00:03.6

00:02.1

00:02.2

00:05.3

00:07.2

00:10.1

00:16.7

00:14.5

00:07.9

Galaxy S3

00:03.8

00:03.4

00:03.5

00:06.6

00:10.6

00:08.8

00:06.5

00:03.7

00:03.2

00:03.3

Galaxy Note

00:03.5

00:02.5

00:02.6

00:01.9

00:01.9

00:01.6

00:01.6

00:00.9

00:00.6

00:00.6

Nokia 920

00:00.3

00:00.4

00:00.3

00:00.3

00:00.2

00:00.3

00:01.3

00:00.8

00:02.2

00:03.9

Sony

00:06.4

00:02.5

00:01.7

00:03.4

00:05.1

00:07.0

00:07.2

00:09.5

00:17.7

00:19.3

Ipad 3

00:00.5

00:00.6

00:00.6

00:00.4

00:00.4

00:00.3

00:00.3

00:00.3

00:00.2

00:00.0

00:06.0

00:00.3

Figure7: Enrollment Process Time

Creating a reference of the fingerprint images has an impact on matching results. The matching
results will be more reliable if an accurate and static reference is created. This study found that by
working with fingerprint images as parabolic curves, a static center point is obtained. This is in
contrast to extracting a core point by using different algorithms. Further, the matching process
51
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

time is shown in Figure 8 for three mobile devices. The average time is 0.4 seconds, which is an
accepted rate.
Matching Process Time
00:01.0

00:00.9

00:00.7

00:00.5

00:00.3

00:00.2

10

9

8

7

6

5

4

3

2

1

Galaxy S

00:00.3

00:00.7

00:00.1

00:00.2

00:00.7

00:00.2

00:00.5

00:00.8

00:00.1

Galaxy S3

00:00.6

00:00.6

00:00.8

00:00.2

00:00.1

00:00.2

00:00.5

00:00.1

00:00.9

00:00.5

Nokia 920

00:00.7

00:00.7

00:00.6

00:00.4

00:00.1

00:00.3

00:00.6

00:00.5

00:00.5

00:00.0

00:00.2
00:00.5

Figure 8: Matching Process Time

5. CONCLUSION
The combination of the cloud computing and mobile computing creates mobile cloud computing
and also introduce security threats such as unauthorized users access. The focus in this researchis
on the mobile cloud and protecting mobile cloud resources from illegitimate access. Biometric
recognition will be used in the near future in mobile devices. The proposed solution for
authenticating mobile cloud users using the existing mobile device camera as a fingerprint sensor
to obtain a fingerprint image, and then process it and recognize it. Results show that the proposed
solution has added value to keep performance at an accepted level.
For future work, accessing log file will be used to help identifying unauthorized attempts to
access data by third parties–the cloud provider or any intruders. Based on these logs, cloud
security policies will be modified and re-configured.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]

X. Li, "Cloud Computing: Introduction, Application and Security from Industry Perspectives,"
International Journal of Computer Science and Network Security, vol. 11, pp. 224-228, 2011.
X. Yu and Q. Wen, "Design of Security Solution to Mobile Cloud Storage," Knowledge Discovery
and Data Mining, pp. 255-263, 2012.
J. Rittinghouse, Cloud computing: implementation, management, and security: CRC, 2009.
M. Ali, "Can a Mobile Cloud Be More Trustworthy than a Traditional Cloud?," Security and Privacy
in Mobile Information and Communication Systems, pp. 125-135, 2012.
F. Omri, R. Hamila, S. Foufou, and M. Jarraya, "Cloud-Ready Biometric System for Mobile Security
Access," Networked Digital Technologies, pp. 192-200, 2012.
J. Hurwitz, R. Bloor, M. Kaufman, and F. Halper, Cloud computing for dummies vol. 1: For
Dummies, 2009.
52
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013
[7]
[9]
[10]

[11]

[12]

[13]
[14]

[15]

[16]
[17]

[18]

[19]

[20]
[21]
[22]

[23]

T. Mather, S. Kumaraswamy, and S. Latif, Cloud security and privacy: an enterprise perspective on
risks and compliance: O'Reilly Media, Incorporated, 2009.
H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: architecture,
applications, and approaches," Wireless Communications and Mobile Computing, 2011.
T. H. Chen, H. Yeh, and W. K. Shih, "An Advanced ECC Dynamic ID-Based Remote Mutual
Authentication Scheme for Cloud Computing," in Multimedia and Ubiquitous Engineering (MUE),
2011 5th FTRA International Conference on, 2011, pp. 155-159.
A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and H. Jae-Lee, "A Strong User Authentication
Framework for Cloud Computing," in Services Computing Conference (APSCC), 2011 IEEE AsiaPacific, 2011, pp. 110-115.
H. Dinesha and V. Agrawal, "Multi-level authentication technique for accessing cloud services," in
Computing, Communication and Applications (ICCCA), 2012 International Conference on, 2012, pp.
1-4.
D. S. Oh, B. H. Kim, and J. K. Lee, "A Study on Authentication System Using QR Code for Mobile
Cloud Computing Environment," Future Information Technology, pp. 500-507, 2011.
J. H. Yang and C. C. Chang, "An ID-based remote mutual authentication with key agreement scheme
for mobile devices on elliptic curve cryptosystem," Computers & Security, vol. 28, pp. 138-143,
2009.
R. Mueller and R. Sanchez-Reillo, "An Approach to Biometric Identity Management Using Low Cost
Equipment," in Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP'09.
Fifth International Conference on, 2009, pp. 1096-1100.
B. Y. Hiew, A. B. J. Teoh, and O. S. Yin, "A secure digital camera based fingerprint verification
system," Journal of Visual Communication and Image Representation, vol. 21, pp. 219-231, 2010.
B. Hiew, A. B. J. Teoh, and D. C. L. Ngo, "Preprocessing of fingerprint images captured with a
digital camera," in Control, Automation, Robotics and Vision, 2006. ICARCV'06. 9th International
Conference on, 2006, pp. 1-6.
P. Yu, D. Xu, H. Li, and H. Zhou, "Fingerprint image preprocessing based on whole-hand image
captured by digital camera," in Computational Intelligence and Software Engineering, 2009. CiSE
2009. International Conference on, 2009, pp. 1-4.
Y. Song, C. Lee, and J. Kim, "A new scheme for touchless fingerprint recognition system," in
Intelligent Signal Processing and Communication Systems, 2004. ISPACS 2004. Proceedings of 2004
International Symposium on, 2004, pp. 524-527.
C. Lee, S. Lee, and J. Kim, "A study of touchless fingerprint recognition system," Structural,
Syntactic, and Statistical Pattern Recognition, pp. 358-365, 2006.
C. Lee, S. Lee, J. Kim, and S. J. Kim, "Preprocessing of a fingerprint image captured with a mobile
camera," Advances in Biometrics, pp. 348-355, 2005.
B. Hiew, A. B. J. Teoh, and D. C. L. Ngo, "Automatic digital camera based fingerprint image
preprocessing," in Computer Graphics, Imaging and Visualisation, 2006 International Conference on,
2006, pp. 182-189.
M. O. Derawi, B. Yang, and C. Busch, "Fingerprint Recognition with Embedded Cameras on Mobile
Phones," Security and Privacy in Mobile Information and Communication Systems, pp. 136-147,
2012.

53
Ad

More Related Content

What's hot (19)

May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
TELKOMNIKA JOURNAL
 
Complexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityComplexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless Security
Olivia Moran
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
tanvir616
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
Brandix India Apparel City Pvt Ltd.
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
395 401
395 401395 401
395 401
Editor IJARCET
 
Data Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art ReviewData Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art Review
Rida Qayyum
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
BRNSS Publication Hub
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
paperpublications3
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
IAESIJEECS
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
CSCJournals
 
Networking java titles Adrit Solution
Networking java titles Adrit SolutionNetworking java titles Adrit Solution
Networking java titles Adrit Solution
Adrit Techno Solutions
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
IJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
IJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
ijasuc
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
TELKOMNIKA JOURNAL
 
Complexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityComplexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless Security
Olivia Moran
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
tanvir616
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Data Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art ReviewData Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art Review
Rida Qayyum
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
BRNSS Publication Hub
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
IAESIJEECS
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
CSCJournals
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
IJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
IJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
ijasuc
 

Similar to Securing mobile cloud using finger print authentication (20)

Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud ComputingMobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
audeleypearl
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
Suzanne Simmons
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
IJRES Journal
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
ranjana dalwani
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
Dr Amira Bibo
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 
Cloud computing on smartphone
Cloud computing on smartphoneCloud computing on smartphone
Cloud computing on smartphone
Alexander Decker
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyCloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
IOSR Journals
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdfA Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
Karla Long
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
Stelios Krasadakis
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
IRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
ijceronline
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud ComputingMobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
audeleypearl
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
Suzanne Simmons
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
IJRES Journal
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
ranjana dalwani
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
Dr Amira Bibo
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Cloud computing on smartphone
Cloud computing on smartphoneCloud computing on smartphone
Cloud computing on smartphone
Alexander Decker
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyCloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
IOSR Journals
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdfA Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
Karla Long
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
Stelios Krasadakis
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
IRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
ijceronline
 
Ad

Recently uploaded (20)

UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Viam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdfViam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdf
camilalamoratta
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Viam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdfViam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdf
camilalamoratta
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Ad

Securing mobile cloud using finger print authentication

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Securing Mobile Cloud Using Finger Print Authentication IehabALRassan, HananAlShaher Department of Computer Science,King Saud University,Riyadh, Saudi Arabia ABSTRACT Mobile cloud computing becomes part of mobile users daily life transactions. Mobile devices with Internet capabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobile devices, these devices can't install and run applications require heavy CPU processing or extensive memory. Cloud computing allows mobile users to synchronize their data with remote storage and utilize applications require heavy CPU processing or extensive memory such as Microsoft Office or Adobe Photoshop, as they run in a desktop computer. The combination of cloud computing and mobile computing introduces mobile cloud computing, which also present new issues of security threats such as unauthorized access to resources exist in mobile cloud. Protecting mobile cloud computing from illegitimate access becomes an important concern to mobile users. This paper proposes and implements a new user authentication mechanism of mobile cloud computing using fingerprint recognition system. Fingerprint images of mobile users can be captured and processed using mobile phone camera to access mobile cloud computing . The implementation of the proposed solution in different mobile operating systems and devices show security enhancement in mobile cloud computing with accepted performance level. KEYWORDS Mobile cloud computing, Wireless Network, Mobile Network, Mobile devices, Cloud computing, Finger print authentication 1. INTRODUCTION The ability to access data and applications from anywhere and at any time with low cost arethe most important benefits of mobile cloud computing. The primary security issue on mobile cloud computing is protecting remote data and applications from illegitimate access. While authorized users can access the data, the cloud provider can also do so. There is also the possibility of unauthorized access, which is access by third parties such as hackers. Therefore, the security issue in mobile cloud computing becomes one of the top areas for research [1, 2]. In tradition, cloud computingusers can avoid the security risk by just encrypting the data before it is sent and stored in the cloud. However, this is not the case with the mobile users, because encryption technology is not suitable for mobile devices due to the encryption process, which requires high workload and high CPU processing[2].In this paper a new mechanism is proposed and implemented to authenticatemobile cloud computing by using fingerprint recognition as part of the security solution. Improving the mechanism of protecting access to the mobile cloud leads to improving the security overall, which at least protects the mobile cloud from unauthorized access. This section starts with an introduction to mobile cloud computing and describes the concept of mobile cloud computing. The rest of the paper is organized as follows: section2 provides a literature review about security solutions on mobile cloud. In section3 and 4 respectively, present the proposed approach as design and experimental results. At the end, conclusion is given in section5. DOI : 10.5121/ijnsa.2013.5604 41
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 1.1. The Mobile Revolution Portability is an added value to computer devices that almost everyone looks for, either at work or at home, along with the preservation of processing power and local data storage. That is illustrated by the growing number of laptops users rather than PCs users and that's why the functionality of mobile phone has been changed. Initially, the basic function of mobile phoneswasto make conversation calls. Nowadays,this becomes a trivial function sincemost of mobile usersneed to browse the Internet and do their online transactions while they are in the move. Thus, the form and the function of mobile phones have been changed. Indeed, functionality of the mobile phone closely resembles that of a personal computer; therefore,people cannot ignore the mobile world and the daily impact of transactional activity of mobile technology. This appears obviously in the increasing of number of users of mobile phones, which provide Internet access and built-in computing applications [3, 4, 5]. Mobile users can eliminate some of the constraints of the traditional computing environment, such as power, space, cost, and time, by combining pre-existing technologies to create an environment and call it cloud computing. Also, if we can make the core technology in new environment, we can create virtualization to allow more flexibility, in which the same physical resources are shared virtually with multi OS. As a result, we well take the advance in processors and storage, reducing the cost of service and increasing the speed. This adds new value that any company is looking for in services. And that leads to say the cloud is a more compelling solution and the evolution of the Internet in the near future will be toward cloud computing [6, 7, 4]. Accessing the Internet through mobile devices has become an everyday event for most of mobile users, and these devices allow users to synchronize data from or to their PCs. However, due to hardware limitations, these devices can't install and run software such as Microsoft Office or Adobe Photoshop. As an alternative, cloud computing allows users to overcome these limitations and becomes the future of mobile computing [3]. Indeed, accessing the cloud with a mobile device has created a new concept called mobile cloud computing (MCC). Data will be available not only at home or at the office, but it can easily be accessed from the cloud with a mobile device and manage your data from anywhere. Mobile devices take data out of homes and offices and put them in our pockets [3]. If clients of mobile cloud computing have an Internet connection, they can accomplish their work simply. Anyway, with all of the advantages provided by mobile cloud computing, security still remains an important issue [5]. 2. LITERATURE REVIEW In the cloud computing environment, users use an authentication system to utilize the cloud servicesthrough a Web-based user interface, either a web browser or a mobile application, or a web service application programming interface (API). Authentication on the cloud is necessary to provide secure access to the cloud services by authorized users only. At present, authentication is done in different methods, such as a simple text password [12]. In the next subsections, a review of some existing authentication systems, which are based on client-server architecture. These existing authentication systems are provided by cloud computing providers, third-party providers, and as literature. 42
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 2.1 Literature There are several proposed strong user authentication provided by researchers to improve mobile cloud security. Omri et al. in [5] introduced an application that uses handwriting recognition as an authentication system to secure access in mobile cloud. In this way, the user is identified by password and unique handwriting style. This application, which used the mobile phone as a biometric-capture device, also used Hadoop (Apache Hadoop is an open-source software that provides applications both reliability and data motion) to establish the connection between mobile user and the cloud via Internet. It has been implemented into two ways. The main difference is in the implementation mode, one as web page and the other as mobile application. In [13], suggested using quick response code (QR code) for a user authentication system in the mobile cloud. In this system, the user ID, password, and the user's image are converted into QR code. In the multilevel authentication system proposed in [12], this authentication system generates and authenticates the password at multiple levels to access the cloud services. Access to the cloud is allowed if authentication is successful in all levels. • First level of authentication is the organization level. This level reads the organization password; if unauthenticated they are going to terminate. If it is authenticated, then it enters a second-level authentication. • Second level of authentication is the team level. This level reads the team password; once authentication is done, it then enters a user-level authentication. • Last level is the user level. This level reads the user password to provide the user privileges and permission. In [11], a strong user authentication system was proposed for cloud computing; this system verifies user authenticity via password, smartcard, and out of band authentication. In 2011, Chen, et al. [10] proposed an extension of Yang and Chang [14]. Chen adds a password protectionbased mechanism with dynamic ID to provide authentication to ensure user legality. As seen in this section, there are a few proposed systems in the literature for mobile cloud, but for regular cloud there are many proposed schemes that are good for improving security in regular cloud, but in the mobile cloud it's so hard for users because of its lack of usability. The balance between security and usability must be found [9], just as when trying to apply the authentication system from a traditional client server to cloud computing. It can be applied, but it has a high risk because the infrastructure in the cloud is shared among users and managed by the cloud providers. 2.2.Cloud computing providers Cloud providers are divided into three parts, depending on the type of the service provided: 1.Software as a Service (SaaS)—the users can access an application remotely via the Internet. 2.Platform as a Service (PaaS)—users can create an application to meet their needs and then deploy it on the cloud. 3.Infrastructure as a Service (IaaS)—users can rent servers, networking components, hardware, and storage. Indeed, when reviewing most cloud providers, perhaps all- have the same authentication system based on user ID or email and password, whether the service provided is critical or not. 43
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 2.3. Third Party Some companies prepare authentication systems as a service to access the cloud. Any services provided by companies other than the cloud provider are called third-party providers. Recently, many of mobile device fingerprint hardware solutions are provided by companies such as Grabba, S.I.C. Biometrics, and Fulcrum biometrics. Other companies provide software with strong authentication system using input either from external hardware or from the software itself. Also, there are many companies providing solutions such as web services and software development kits (SDK) for developers to create and integrate an authentication system to help the end users. But in this research we focus on products forwarded to the end users as a ready product to use. As seen in the literature review, the lack of existing mobile user authentication systems is the main motivation to improve the mobile cloud security through strengthen the authentication system. 2.4. Related works A few researchers have studied how to extract a fingerprint image from digital camera. [15, 16] have shown that is possible to extract a fingerprint by using a low-cost webcam when applying different preprocessing and image enhancements approaches. [17] suggested a preprocessing approach for fingerprint recognition. In [18], they present fingerprint image preprocessing approaches based on a whole-hand image captured by digital camera. This method starts with locating a key point location from the hand contour image. Then the middle finger is segmented from the hand image to extract fingerprint from it. In [19], they used a monochrome digital camera and, to reduce the noise in the fingerprint image, they used a low-pass filter, then feature extraction is based on block mean value and block coherence analysis. In [20], they use a strong view difference image rejection method to convert the 3D to a 2D image, and then use the core point detection algorithm to obtain the minutiae points. Feature extraction based on region growing method, frequency information and color distribution information is used in [21], and then, to do orientation estimation, they apply the iterative robust regression method. In [22], the segmentation is done by skin color detection and then enhanced by using the shorttime Fourier transform analysis; after that the core point is detected. 44
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Fig.1. The Proposed Design Soltion 3.THE DESIGNED APPROACH In this section, the proposed authentication mechanism using fingerprint recognition to secure access in mobile cloud is explained. Recently, there have a few works about using a digital camera or a webcam as a sensor, but in literature only. Embedding a special fingerprint sensor or adding external hardware as a fingerprint reader will be costly and will influence the mobile simplicity. Utilizing the existing camera in a mobile phone to capture fingerprint images as a biometric sensor is inexpensive to implement. The proposed solution is using a fingerprint recognition system to obtain the fingertip image through the mobile phone camera. The aim is to convert fingertip image obtained by mobile phone camera to fingerprint image and extract ridge structure from it to be as similar as possible with the ridge structure gained from fingerprint sensor. Of course, mobile camera can't convert the image to be like the output image obtained and processed by using fingerprint sensor, but at least this process aim to export an acceptable output. Figure 1 shows the proposed design soltion and how it works. Save or store fingerprint image on mobile device is not requirement, due each time user want access the cloud capture a new fingerprint image and login, as simple as. The whole approach was hosted on cloud to take all benefit from it (all processes and storage was there). As a developer account on a cloud provider has all privileges to create and maintain customize database as well as their applications. The database provided with Platform as a Service (PaaS) from cloud provider. 45
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 3.1.The proposed algorithm Initially, in the enrollment phase the user presents the fingertip to the mobile phone camera to obtain a fingerprint sample and extracted features by pre-processing the sample. Then, it is stored in a database for comparison to verify the identity of the user. After take a fingerprint image as input on login form, preprocessing image function working to extract features then matching function start to match between these features with features were stored in database. If matching succeeded, then user accepted otherwise user rejected. The similarity score (S) is the result of the comparison between the extracted features and features stored in a database. If (S is low value) then Little similarity If (S is high value) then High similarity After that, the decision will be based on the similarity score (S), which is compared to a predefined threshold (T). If (S > T) then The user is accepted Else if (S < T) The user is rejected [23]. 4.EXPERIMENTAL RESULTS AND DISCUSSION The tests were separated into two parts: • • Functionality Performance 4.1 Evaluation Functionality This section evaluates each function in the pre-processing class. All functions (convert to grayscale, filtering, etc.) gave positive test results. Figure 2 summarizes the output from various functions, including (a) the original image, (b) convert to gray-scale, (c) edge enhancement, (d) filtering, (e) binarization, (f) thinning, (g) map direction, and (h) minutiae extraction. 46
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Figure 2: Functions - Output for Galaxy Note 4.2.Evaluation Performance In this section, the process time is calculated for each function to test if the performance rate is acceptable according to the rates established by the National Institute of Standards and Technology (NIST). Figures 3,4 and5show the process time from testing the fingerprint images for the Sony Xperia S and the Samsung Galaxy S3 devices. 4.3.Conclusions from the test results From the results presented, the following conclusions can be noticed: - The proposed solution is not only to secure unauthorized access, but also to protect databases from injection attacks due to the absence of string input from users. The fingerprint image is the only input from the user in accordance with the interface design. No other input is permitted from the user to enter the system. - The interface in this solution is based on HTML5, which is a cross-platform and has been tested on different mobile platforms. - With the addition of some filters to segment the method in this solution, it will be able to work with web cameras. - When work on fingerprint images as parabolic curves (parabola), it is easy to extract a static and accurate center point. - Different company mobile devices that's mean different quality, resolution and size of images. In testing take this in account to prove the proposed solution should work successful with it. Figure 3 shows the experiment results of the fingerprint image taken with the Sony Xperia S device, which recorded 0.9 seconds as the maximum time and 0.4 seconds as the average. Figure 4 illustrates the process time for an image taken with a Samsung Galaxy S3 device; the maximum time is 2.4 seconds and the average is 0.5 seconds. 47
  • 8. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Another example is the BlackBerry Z in Figure 5, with approximately 4 seconds as a maximum time and 0.8 seconds as the average recorded time. Sony Xperia S 00:01.7 00:01.6 00:01.4 00:01.2 00:01.0 00:00.9 00:00.7 00:00.5 00:00.3 00:00.2 00:00.0 Convert to Gray 10 00:00.7 9 00:00.0 8 00:00.0 7 00:00.0 6 00:00.0 5 00:00.0 4 00:00.0 3 00:00.0 2 00:00.0 1 00:00.0 Edge Enhancement 00:00.5 00:00.4 00:00.6 00:00.5 00:00.4 00:00.5 00:00.9 00:00.5 00:00.5 00:00.4 Filtering 00:00.2 00:00.1 00:00.9 00:00.1 00:00.1 00:00.1 00:00.1 00:00.1 00:00.1 00:00.7 Binarization 00:00.1 00:00.1 00:00.1 00:00.2 00:00.1 00:00.1 00:00.1 00:00.1 00:00.1 00:00.1 Thinning 00:00.4 00:00.4 00:00.3 00:00.4 00:00.4 00:00.4 00:00.4 00:00.3 00:00.5 00:00.2 Direction 00:00.2 00:00.2 00:00.2 00:00.1 00:00.2 00:00.2 00:00.2 00:00.2 00:00.3 00:00.2 Extracted 00:00.1 00:00.7 00:00.6 00:00.9 00:00.1 00:00.9 00:00.9 00:00.7 00:00.1 00:00.7 Time process 00:01.3 00:01.1 00:01.7 00:01.2 00:01.4 00:01.2 00:01.3 00:01.1 00:01.6 00:00.9 Figure 3: Time process for Sony Xperia S images 48
  • 9. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Galaxy S3 00:01.0 00:00.9 00:00.7 00:00.5 00:00.3 00:00.2 00:00.0 Convert to Gray 10 00:00.9 9 00:00.6 8 00:00.2 7 00:00.7 6 00:00.9 5 00:00.6 4 00:00.2 3 00:00.7 2 00:00.7 1 00:00.5 Edge Enhancement 00:00.4 00:00.4 00:00.5 00:00.5 00:00.5 00:00.4 00:00.7 00:00.6 00:00.7 00:00.4 Filtering 00:00.1 00:00.1 00:00.2 00:00.2 00:00.1 00:00.1 00:00.2 00:00.1 00:00.2 00:00.1 Binarization 00:00.1 00:00.1 00:00.2 00:00.1 00:00.1 00:00.1 00:00.2 00:00.1 00:00.2 00:00.1 Thinning 00:00.4 00:00.4 00:00.7 00:00.4 00:00.4 00:00.5 00:00.6 00:00.5 00:00.4 00:00.5 Direction 00:00.2 00:00.2 00:00.2 00:00.2 00:00.2 00:00.3 00:00.8 00:00.2 00:00.2 00:00.4 Time process 00:00.9 00:00.1 00:00.1 00:00.1 00:00.1 00:00.1 00:00.2 00:00.9 00:01.0 00:00.1 Figure 4: Time process for Samsung Galaxy S3 BlackBerry Z 00:04.3 00:03.9 00:03.5 00:03.0 00:02.6 00:02.2 00:01.7 00:01.3 00:00.9 00:00.4 00:00.0 Convert to Gray 10 00:00.9 9 00:00.8 8 00:00.8 7 00:00.9 6 00:00.1 5 00:00.1 4 00:00.9 3 00:00.8 2 00:01.0 1 00:00.8 Edge Enhancement 00:00.1 00:00.1 00:00.1 00:00.2 00:00.1 00:00.9 00:00.1 00:00.9 00:00.9 00:00.9 Filtering 00:00.9 00:00.7 00:01.0 00:00.9 00:00.8 00:00.5 00:00.8 00:00.4 00:00.5 00:00.1 Binarization 00:00.4 00:00.4 00:00.4 00:00.5 00:00.4 00:00.3 00:00.3 00:00.2 00:00.3 00:00.3 Thinning 00:01.0 00:01.4 00:00.9 00:01.3 00:01.4 00:00.7 00:00.7 00:00.7 00:00.7 00:00.8 Direction 00:00.5 00:00.5 00:00.4 00:00.4 00:00.4 00:00.3 00:00.4 00:00.3 00:00.2 00:00.5 Extracted 00:00.3 00:00.3 00:00.2 00:00.2 00:00.2 00:00.2 00:00.3 00:00.1 00:00.2 00:00.3 Time process 00:03.6 00:03.8 00:03.2 00:03.9 00:03.2 00:02.3 00:02.8 00:02.2 00:02.1 00:03.0 Figure 5: Time process for BlackBerry Z 49
  • 10. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 4.4 Discussion The fingerprint images used in testing have a resolution of 72 dots per inch (dpi) which is less than fingerprint images resolution (300 dpi) that captured from fingerprint sensors. From the experiment results, it is evident that the range for the total processing time to pre-process a fingerprint image takes between 1 and 12 seconds. Table 1 summarizes the range of process times for each function in the pre-processing class. An acceptable enrollment time should be equal to or less than two minutes, which means that the enrollment process must be completed in 120 seconds. When the total process time is subtracted from the acceptable enrollment time, there are 108 seconds remaining for enrollment. Figures 6 and 7 show the enrollment process times in the proposed approach and how the proposed approach achieved acceptable rates. Table 1: Summary of Process Time Function Convert to Gray Edge Enhancement Filtering Binarization Thinning Direction Extracted Total Time process Range of time process 0.1 - 1 0.1 – 1.2 0.1 - 1 0.1 – 0.9 0.1 – 1.4 0.1 – 0.9 0.1 – 1 0.7 – 11.9 Average time 0.6s 0.5s 0.4s 0.3s 0.4s 0.2s 0.5s 1.9s Figure 6 shows the process time of enrolment for six different mobile devices, and nearly all are very similar. In addition, Figure 7 illustrates that 0.2 seconds is the minimum time, 19 seconds is the maximum, and 0.4 seconds is the average. This means that the proposed approach achieved 19 seconds, with 108 seconds being the maximum acceptable time. 50
  • 11. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 00:21.6 00:17.3 00:13.0 Galaxy S Galaxy S3 Galaxy Note Nokia 920 Sony 00:08.6 Ipad 3 00:04.3 00:00.0 10 9 8 7 6 5 4 3 2 1 Figure 6: The time of Enrollment Process Enrollment Process Time 00:21.6 00:17.3 00:13.0 00:08.6 00:04.3 10 9 8 7 6 5 4 3 2 1 Galaxy S 00:03.6 00:02.1 00:02.2 00:05.3 00:07.2 00:10.1 00:16.7 00:14.5 00:07.9 Galaxy S3 00:03.8 00:03.4 00:03.5 00:06.6 00:10.6 00:08.8 00:06.5 00:03.7 00:03.2 00:03.3 Galaxy Note 00:03.5 00:02.5 00:02.6 00:01.9 00:01.9 00:01.6 00:01.6 00:00.9 00:00.6 00:00.6 Nokia 920 00:00.3 00:00.4 00:00.3 00:00.3 00:00.2 00:00.3 00:01.3 00:00.8 00:02.2 00:03.9 Sony 00:06.4 00:02.5 00:01.7 00:03.4 00:05.1 00:07.0 00:07.2 00:09.5 00:17.7 00:19.3 Ipad 3 00:00.5 00:00.6 00:00.6 00:00.4 00:00.4 00:00.3 00:00.3 00:00.3 00:00.2 00:00.0 00:06.0 00:00.3 Figure7: Enrollment Process Time Creating a reference of the fingerprint images has an impact on matching results. The matching results will be more reliable if an accurate and static reference is created. This study found that by working with fingerprint images as parabolic curves, a static center point is obtained. This is in contrast to extracting a core point by using different algorithms. Further, the matching process 51
  • 12. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 time is shown in Figure 8 for three mobile devices. The average time is 0.4 seconds, which is an accepted rate. Matching Process Time 00:01.0 00:00.9 00:00.7 00:00.5 00:00.3 00:00.2 10 9 8 7 6 5 4 3 2 1 Galaxy S 00:00.3 00:00.7 00:00.1 00:00.2 00:00.7 00:00.2 00:00.5 00:00.8 00:00.1 Galaxy S3 00:00.6 00:00.6 00:00.8 00:00.2 00:00.1 00:00.2 00:00.5 00:00.1 00:00.9 00:00.5 Nokia 920 00:00.7 00:00.7 00:00.6 00:00.4 00:00.1 00:00.3 00:00.6 00:00.5 00:00.5 00:00.0 00:00.2 00:00.5 Figure 8: Matching Process Time 5. CONCLUSION The combination of the cloud computing and mobile computing creates mobile cloud computing and also introduce security threats such as unauthorized users access. The focus in this researchis on the mobile cloud and protecting mobile cloud resources from illegitimate access. Biometric recognition will be used in the near future in mobile devices. The proposed solution for authenticating mobile cloud users using the existing mobile device camera as a fingerprint sensor to obtain a fingerprint image, and then process it and recognize it. Results show that the proposed solution has added value to keep performance at an accepted level. For future work, accessing log file will be used to help identifying unauthorized attempts to access data by third parties–the cloud provider or any intruders. Based on these logs, cloud security policies will be modified and re-configured. REFERENCES [1] [2] [3] [4] [5] [6] X. Li, "Cloud Computing: Introduction, Application and Security from Industry Perspectives," International Journal of Computer Science and Network Security, vol. 11, pp. 224-228, 2011. X. Yu and Q. Wen, "Design of Security Solution to Mobile Cloud Storage," Knowledge Discovery and Data Mining, pp. 255-263, 2012. J. Rittinghouse, Cloud computing: implementation, management, and security: CRC, 2009. M. Ali, "Can a Mobile Cloud Be More Trustworthy than a Traditional Cloud?," Security and Privacy in Mobile Information and Communication Systems, pp. 125-135, 2012. F. Omri, R. Hamila, S. Foufou, and M. Jarraya, "Cloud-Ready Biometric System for Mobile Security Access," Networked Digital Technologies, pp. 192-200, 2012. J. Hurwitz, R. Bloor, M. Kaufman, and F. Halper, Cloud computing for dummies vol. 1: For Dummies, 2009. 52
  • 13. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 [7] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] T. Mather, S. Kumaraswamy, and S. Latif, Cloud security and privacy: an enterprise perspective on risks and compliance: O'Reilly Media, Incorporated, 2009. H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: architecture, applications, and approaches," Wireless Communications and Mobile Computing, 2011. T. H. Chen, H. Yeh, and W. K. Shih, "An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing," in Multimedia and Ubiquitous Engineering (MUE), 2011 5th FTRA International Conference on, 2011, pp. 155-159. A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and H. Jae-Lee, "A Strong User Authentication Framework for Cloud Computing," in Services Computing Conference (APSCC), 2011 IEEE AsiaPacific, 2011, pp. 110-115. H. Dinesha and V. Agrawal, "Multi-level authentication technique for accessing cloud services," in Computing, Communication and Applications (ICCCA), 2012 International Conference on, 2012, pp. 1-4. D. S. Oh, B. H. Kim, and J. K. Lee, "A Study on Authentication System Using QR Code for Mobile Cloud Computing Environment," Future Information Technology, pp. 500-507, 2011. J. H. Yang and C. C. Chang, "An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem," Computers & Security, vol. 28, pp. 138-143, 2009. R. Mueller and R. Sanchez-Reillo, "An Approach to Biometric Identity Management Using Low Cost Equipment," in Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP'09. Fifth International Conference on, 2009, pp. 1096-1100. B. Y. Hiew, A. B. J. Teoh, and O. S. Yin, "A secure digital camera based fingerprint verification system," Journal of Visual Communication and Image Representation, vol. 21, pp. 219-231, 2010. B. Hiew, A. B. J. Teoh, and D. C. L. Ngo, "Preprocessing of fingerprint images captured with a digital camera," in Control, Automation, Robotics and Vision, 2006. ICARCV'06. 9th International Conference on, 2006, pp. 1-6. P. Yu, D. Xu, H. Li, and H. Zhou, "Fingerprint image preprocessing based on whole-hand image captured by digital camera," in Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on, 2009, pp. 1-4. Y. Song, C. Lee, and J. Kim, "A new scheme for touchless fingerprint recognition system," in Intelligent Signal Processing and Communication Systems, 2004. ISPACS 2004. Proceedings of 2004 International Symposium on, 2004, pp. 524-527. C. Lee, S. Lee, and J. Kim, "A study of touchless fingerprint recognition system," Structural, Syntactic, and Statistical Pattern Recognition, pp. 358-365, 2006. C. Lee, S. Lee, J. Kim, and S. J. Kim, "Preprocessing of a fingerprint image captured with a mobile camera," Advances in Biometrics, pp. 348-355, 2005. B. Hiew, A. B. J. Teoh, and D. C. L. Ngo, "Automatic digital camera based fingerprint image preprocessing," in Computer Graphics, Imaging and Visualisation, 2006 International Conference on, 2006, pp. 182-189. M. O. Derawi, B. Yang, and C. Busch, "Fingerprint Recognition with Embedded Cameras on Mobile Phones," Security and Privacy in Mobile Information and Communication Systems, pp. 136-147, 2012. 53
  翻译: