MODELING OF OPTIMAL MULTI KEY HOMOMORPHIC ENCRYPTION WITH DEEP LEARNING BIOMETRIC BASED AUTHENTICATION SYSTEM FOR CLOUD COMPUTING
DOI:
https://doi.org/10.11113/aej.v13.20160Keywords:
Biometrics, Authentication, Cloud Computing, Image encrypyion, Security, Optimal key GenerationAbstract
More recently, cloud computing (CC) has gained considerable attention among research communities and business people. Inspite of the advantages of CC, security, and privacy remains a challenging problem. Therefore, biometric authentication systems have been employed and fingerprint is considered as widely employed to attain security. In addition, image encryption techniques can be used to encrypt the fingerprint biometric image to add an extra level of security. Based on these motivation, this study designs an optimal multikey homomorphic encryption (OMHE) with stacked autoencoder (SAE) based biometric authentication system for CC environment. The proposed OMHE-SAE model aims to encrypt the biometrics using OMHE technique and then verification takes place using SAE model. In addition, the OMHE technique involves the optimal key generation process using sandpiper optimization (SPO) algorithm to effectively choose the keys for encryption and decryption. Furthermore, the verification of decrypted biometrics takes place by the use of SAE model. A wide range of simulation analyses take place on benchmark datasets and the experimental outcomes portrayed the betterment of the OMHE-SAE More than cutting edge technology.
References
Kakkad, V., Patel, M. and Shah, M., 2019. Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidisciplinary Modeling, Experiments and Design, 2(4): 233-248. DOI: https://www.mecs-press.org/ijigsp/ijigsp-v14-n4/v14n4-2.html
Bothe S, Jadhao RM, Shinde S 2012 Cloud computing based image processing applications for agro informatics using ‘self-learning system’ approach. In: Proceedings of AIPA, 1–4. DOI: https://www.semanticscholar.org/paper/CLOUD COMPUTING BASED-IMAGE-PROCESSING-APPLICATIONS-Bothe-Jadhao/06cb232aa5ddc962b5e67c526f665384540bbc81
Thieling L, Schuer A, Hartung G, Buchel G 2014. Embedded image processing system for cloud-based applications. In: International Conference on sytems, signals and image processing, 1–4. DOI:https://www.researchgate.net/publication/289352599_Design_of_image_sampling_and_processing_system_on_3D_measuring_machine
Rathi R, Choudhary M, Chandra B 2012. An application of face recognition system using image processing and neural networks. nternational Journal Computer Technology. 3(1): 45–49. DOI: https://aip.scitation.org/doi/abs/10.1063/1.5005335
Bala Y, Malik A 2018. Biometric inspired homomorphic encryption algorithm for secured cloud computing. In: Panigrahi B, Hoda M, Sharma V, Goel S (eds) Nature inspired computing. Advances In Intelligent Systems And Computing, 652: 13–21 Springer, Singapore. DOI: https://app.dimensions.ai/details/publication/pub.1092087643
Wang S, Nassar M, Atallah M, Malluhi Q 2013. Secure and private outsourcing of shape-based feature extraction. In: International Conference On Information And Communications Security, 90–99
DOI: https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/108/
Tuyls, P. and Goseling, J., 2004, May. Capacity and examples of template-protecting biometric authentication systems. In International Workshop on Biometric Authentication 158-170. Springer, Berlin, Heidelberg. DOI: https://eprint.iacr.org/2004/106.pdf
Simoens, K., Bringer, J., Chabanne, H. and Seys, S., 2012. A framework for analyzing template security and privacy in biometric authentication systems. IEEE Transactions on Information forensics and security, 7(2): 833 841. DOI: https://link.springer.com/chapter/10.1007/978-3-319-12280-9_19
Biggio, B., Akhtar, Z., Fumera, G., Marcialis, G.L. and Roli, F., 2012. Security evaluation of biometric authentication systems under real spoofing attacks. IET biometrics, 1(1): 11-24. DOI: http://pralab.diee.unica.it/en/node/667
Joseph, T., Kalaiselvan, S.A., Aswathy, S.U., Radhakrishnan, R. and Shamna, A.R., 2021. A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment. Journal of Ambient Intelligence and Humanized Computing, 12(6): 6141 6149. DOI: https://ouci.dntb.gov.ua/en/works/7BmAXJg9/
Kumar, P., Singhal, A., Saini, R., Roy, P.P. and Dogra, D.P., 2018. A pervasive electroencephalography-based person authentication system for cloud environment. Displays, 55: 64-70. DOI: https://www.sciencedirect.com/science/article/abs/pii/S0141938222000506#!
Venkatachalam, K., Prabu, P., Almutairi, A. and Abouhawwash, M., 2021. Secure biometric authentication with de-duplication on distributed cloud storage. PeerJ Computer Science. 7: 569. DOI: https://peerj.com/articles/cs-569/
Ilankumaran, S. and Deisy, C., 2019. Multi-biometric authentication system using finger vein and iris in cloud computing. Cluster Computing, 22(1): 103 117. DOI: https://dl.acm.org/doi/abs/10.1007/s10586-018-1824-9
Bartuzi, E. and Trokielewicz, M., 2021. Multispectral hand features for secure biometric authentication systems. Concurrency and Computation: Practice and Experience, 33(18): 6471. DOI: https://www.researcher-app.com/paper/8283752
Ali, Z., Hossain, M.S., Muhammad, G., Ullah, I., Abachi, H. and Alamri, A., 2018. Edge-centric multimodal authentication system using encrypted biometric templates. Future Generation Computer Systems, 85:76 87. DOI: https://pure.ulster.ac.uk/ws/portalfiles/portal/71152905/Multimodal_biometrics.pdf
Pan, H., Lei, Y. and Jian, C., 2018. Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing, 2018(1):1-10. DOI: https://www.academia.edu/44376740/A_new_block_cipher_for_image_encryption_based_on_multi_chaotic_systems
Shankar, K., Lakshmanaprabu, S.K., Gupta, D., Khanna, A. and de Albuquerque, V.H.C., 2020. Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, 32(4): 5122. DOI: https://onlinelibrary.wiley.com/doi/10.1002/cpe.5122
Kaur, A., Jain, S. and Goel, S., 2020. Sandpiper optimization algorithm: a novel approach for solving real-life engineering problems. Applied Intelligence, 50(2): 582-619.
DOI: https://dl.acm.org/doi/abs/10.1007/s10489-019-01507-3
Tang, C., Luktarhan, N. and Zhao, Y., 2020. Saae-Dnn: Deep Learning Method on Intrusion Detection. Symmetry, 12(10): 1695. DOI: https://www.mdpi.com/2073-8994/12/10/1695
Prabhu.D, Vijay Bhanu.S, Suthir.S, 2022. Privacy preserving steganography based biometric authentication system for cloud computing environment, Measurements Sensors. 24: 100511. Elsevier. DOI: https://www.sciencedirect.com/science/article/pii/S2665917422001453?via%3Dihub
Sunil Kumar Muttoo., Nisha, Archana Singhal. 2023. A novel privacy preserving technique using steganography and L – diversity for relations educational dataset. International Journal of Information Technology 15: 3307–3325 Springer. DOI: https://link.springer.com/article/10.1007/s41870-023-01305-8
Mohamed, and Ashiba. Hazzan A Youness, Huda Ashiba. 2023. Proposed homomorphic DWT for cancellable palm print recognition technique. Multimedia Tools and Applications. Springer. DOI:https://link.springer.com/article/10.1007/s11042-023-15710-5