期刊文献+

An Indirect Fingerprint Authentication Scheme in Cloud Computing

An Indirect Fingerprint Authentication Scheme in Cloud Computing
下载PDF
导出
摘要 The cloud computing offers dynamically scalable online resources provisioned as a service over the Internet cheaply. However, the security challenges it poses are equally slriking. The reliable user authentication techniques are required to combat the rising security threat in cloud communications. Due to the non-denial requirements of remote user authentication scheme, it is most commonly achieved using some form of biomeO'ics-based method. Fingerprint authentication is one of the popular and effective approaches to allow the only authorized users to access the cryptographic keys. While the critical issue in remote biometric cryptosystem is to protect the template of a user stored in a database. The biometric template is not secure and the stolen templates cannot be revoked, which is easy to leak user identity information. To overcome these shortcomings, in this paper, an indirect fingerprint authentication scheme is proposed. Further, we apply this secure scheme to the cloud system combing with PKI mechanism. At last, a comprehensive and detailed security analysis of the proposed scheme in cloud computing is provided.
出处 《International English Education Research》 2013年第12期40-43,共4页 国际英语教育研究(英文版)
关键词 cloud computing FINGERPRINT AUTHENTICATION PKI template security. 英语教学 教学方法 阅读教学 课外阅读 英语语法
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部