USER'S PRIVACY IN CLOUD WITH IRIS AUTHENTICATION
P S Abdul Lateef Haroon, Dr Fathima Jabeen
Abstract
Cloud computing allows use of resources which are being daily accessed by millions of users which poses risk on the privacy of the users. In our paper we use Iris as a part of PII (Personal Identifiable Information) to authenticated the user itself to the service provider as Iris recognition is computationally effective as well as reliable in terms of recognition rules. After user is being authenticated service provider cannot be trusted to share other sensitive information in PII like social security numbers etc to perform various transactions , to prevent sensitive information to be exposed we propose use of IDM .The approach is based on the use of unary function over encrypted data and multi-party computing for negotiating a use of a cloud service. It uses active bundle.—which is a middleware agent that includes PII data, privacy policies, a virtual machine that enforces the policies, and has a set of protection mechanisms to protect itself. An active bundle interacts on behalf of a user to authenticate to cloud services using user’s privacy policies
References
- John Daugman, “How iris recognition works”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, January 2004
- Rohit Ranchal, Bharat Bhargava , Lotfi Ben Othmane, Leszek Lilien, Anya Kim, Myong Kang , Mark Linderman Protection of Identity Information in Cloud Computing without Trusted Third Party 2010 29th IEEE International Symposium on Reliable Distributed Systems
- Pelin Angin, Bharat Bhargava, Rohit Ranchal, Noopur Singh, Lotfi Ben Othmane, Leszek LilienAn Entity-centric Approach for Privacy and Identity Management in Cloud Computing
- D.Kesavaraja, D.Sasireka, D.Jeyabharathi, Cloud Software as a Service with Iris Authentication Volume 1, No. 2, September 2010 Journal of Global Research in Computer Science
- Siani Pearson Taking Account of Privacy when Designing Cloud Computing Services
- Guidelines on Security and Privacy in Public Cloud Computing Wayne Jansen, Timothy Grance
- Data Security Model for Cloud Computing Dai Yuefa, Wu Bo, Gu Yaqiang, Zhang Quan, Tang Chaojing
Back