The cloud server selects the most usually considered for the encryption request and gives the information administrator the relevant indexes. In order to retrieve the user's request message, the databases owners evaluates the similarities between both the identify and analyze and the biometric information connected with the indexes [22].
As a practical method to recognize people, biometric-based authentication, which depends on individual's physiological or behavioural features, is becoming more and more popular. “The term biometrics relates to an authentication method that instantly measures distinctive physical features like the fingerprint, voice, ear, eye color, iris, and palm print”. The major advantages of biometrics are “(1) higher level of security of stored data (2) privacy preservation of users (3) diminutive chances of forgery and (4) cost-effective based solutions and (5) user friendliness”. Since, encryption is the conversion of data into a form that cannot be easily understood by unauthorized people [23].
Employing biometrics encrypting for biometric information also improves privacy in cloud computing. The cutting- edge method of biometric encryption aims to improve the privacy of biometrics data in cloud computing. A method for securing biometric identification is called biometric encryption (BE). Recent times, the economic viability of dispatching biometric encrypted communications have been performed for mobile Cloud services. Consequently, it is strongly advised that biometric encrypted data be used in cloud computing [24].
Conclusion
In order to avoid the significant costs of processing and storage, databases administrators are tempted to outsourcing identification activities and significant amounts of biometric information to the cloud. This, although, raises possible privacy risks for consumers. The paradigm of cloud computing, which is constantly changing and acquiring new characteristics and capabilities, is used to preserve most of the information. In cloud computing, reliable authentication is essential to only offer cloud storage to authenticate users. Utilizing a biometric identification solution significantly raises the secure communication of a cloud service in aspects of identity verification.
Among the most cutting-edge and secured methods for biometric authentication in cloud computing is this method. Every process involving the biometric characteristics has different advantages and disadvantages. Since we employed finger print technology along with other encryption techniques and a larger amount of cloud storage, a same task can be done in the future using various biometrics.
References
1. Kumar. (2019). Cloud computing security issues and its challenges: A comprehensive research. Int. J. Recent Technol. Eng., 8(1), 10–14.
2. ArunPrakash, T. Jayasankar, & K. Vinothkumar. (2018). Biometric encoding and biometric authentication (beba) protocol for secure cloud in M-commerce environment. Appl. Math. Inf. Sci., 12(1), 255–263. doi: 10.18576/amis/120126.
3. N. Sharath, T. M. Rajesh, & M. Patil. (2019). Analysis of secure multimedia communication in cloud computing. 2019 2nd Int. Conf. Intell. Comput. Instrum. Control Technol. pp. 136–144. doi: 10.1109/ICICICT46008.2019.8993352.
4. Nandan Kumar, & A. Vajpayee. (2016). A survey on secure cloud: security and privacy in cloud computing. Am. J. Syst. Softw., 4(1), 14–26. doi: 10.12691/ajss-4-1-2.
5. N. Nguyen, & T. T. T. Le. (2022). Authentication and encryption algorithms for data security in cloud computing: A comprehensive review. Proc. Sixth Int. Conf. Res. Intell. Comput., 27, pp. 57–63. doi: 10.15439/2021r7.
6. V. Rosy. (2021). Biometric security for cloud data using fingerprint and palm print. Sample Fingerprint, IX(Ii), 58–67.
7. Tiwari, & A. Saklani. (2013). Role of biometric cryptography in cloud computing. Int. J. Comput. Appl., 70(9), 34–38. doi: 10.5120/11993-7874.
8. Gawade, A. Bharti, A. Raj, & S. Madane. (2017). Biometric authentication using software as a service in cloud computing. Int. J. Eng. Comput. Sci., 6(3), 20410–20413. doi: 10.18535/ijecs/v6i3.01.
9. Akshay Pawle, & Vrushsen P. Pawar. (2017). A study of different biometric authentication techniques in cloud computing. Int. J. Eng. Res., V6(05), 612–619. doi: 10.17577/ijertv6is050575.
10. Ansar, S. Arshad, N. Nazir, & M. Fatima. (2018). Biometric encryption in cloud computing: A systematic review. Int. Comput. Sci. Netw., 6(1), 10–19.