MODELING OF OPTIMAL MULTI KEY HOMOMORPHIC ENCRYPTION WITH DEEP LEARNING BIOMETRIC BASED AUTHENTICATION SYSTEM FOR CLOUD COMPUTING

Authors

  • D. Prabhu Department of Computer Science and Engineering, Annamalai University, Annamalai Nagar, Chidambaram, Tamil Nadu, India
  • S.Vijay Bhanu Department of Computer Science and Engineering, Annamalai University, Annamalai Nagar, Chidambaram, Tamil Nadu, India
  • S. Suthir Department of Computer Science and Engineering, Annamalai University, Annamalai Nagar, Chidambaram, Tamil Nadu, India

DOI:

https://doi.org/10.11113/aej.v13.20160

Keywords:

Biometrics, Authentication, Cloud Computing, Image encrypyion, Security, Optimal key Generation

Abstract

More recently, cloud computing (CC) has gained considerable attention among research communities and business people. Inspite of the advantages of CC, security, and privacy remains a challenging problem. Therefore, biometric authentication systems have been employed and fingerprint is considered as widely employed to attain security. In addition, image encryption techniques can be used to encrypt the fingerprint biometric image to add an extra level of security. Based on these motivation, this study designs an optimal multikey homomorphic encryption (OMHE) with stacked autoencoder (SAE) based biometric authentication system for CC environment. The proposed OMHE-SAE model aims to encrypt the biometrics using OMHE technique and then verification takes place using SAE model. In addition, the OMHE technique involves the optimal key generation process using sandpiper optimization (SPO) algorithm to effectively choose the keys for encryption and decryption. Furthermore, the verification of decrypted biometrics takes place by the use of SAE model. A wide range of simulation analyses take place on benchmark datasets and the experimental outcomes portrayed the betterment of the OMHE-SAE More than cutting edge technology.

References

Kakkad, V., Patel, M. and Shah, M., 2019. Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidisciplinary Modeling, Experiments and Design, 2(4): 233-248. DOI: https://www.mecs-press.org/ijigsp/ijigsp-v14-n4/v14n4-2.html

Bothe S, Jadhao RM, Shinde S 2012 Cloud computing based image processing applications for agro informatics using ‘self-learning system’ approach. In: Proceedings of AIPA, 1–4. DOI: https://www.semanticscholar.org/paper/CLOUD COMPUTING BASED-IMAGE-PROCESSING-APPLICATIONS-Bothe-Jadhao/06cb232aa5ddc962b5e67c526f665384540bbc81

Thieling L, Schuer A, Hartung G, Buchel G 2014. Embedded image processing system for cloud-based applications. In: International Conference on sytems, signals and image processing, 1–4. DOI:https://www.researchgate.net/publication/289352599_Design_of_image_sampling_and_processing_system_on_3D_measuring_machine

Rathi R, Choudhary M, Chandra B 2012. An application of face recognition system using image processing and neural networks. nternational Journal Computer Technology. 3(1): 45–49. DOI: https://aip.scitation.org/doi/abs/10.1063/1.5005335

Bala Y, Malik A 2018. Biometric inspired homomorphic encryption algorithm for secured cloud computing. In: Panigrahi B, Hoda M, Sharma V, Goel S (eds) Nature inspired computing. Advances In Intelligent Systems And Computing, 652: 13–21 Springer, Singapore. DOI: https://app.dimensions.ai/details/publication/pub.1092087643

Wang S, Nassar M, Atallah M, Malluhi Q 2013. Secure and private outsourcing of shape-based feature extraction. In: International Conference On Information And Communications Security, 90–99

DOI: https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/108/

Tuyls, P. and Goseling, J., 2004, May. Capacity and examples of template-protecting biometric authentication systems. In International Workshop on Biometric Authentication 158-170. Springer, Berlin, Heidelberg. DOI: https://eprint.iacr.org/2004/106.pdf

Simoens, K., Bringer, J., Chabanne, H. and Seys, S., 2012. A framework for analyzing template security and privacy in biometric authentication systems. IEEE Transactions on Information forensics and security, 7(2): 833 841. DOI: https://link.springer.com/chapter/10.1007/978-3-319-12280-9_19

Biggio, B., Akhtar, Z., Fumera, G., Marcialis, G.L. and Roli, F., 2012. Security evaluation of biometric authentication systems under real spoofing attacks. IET biometrics, 1(1): 11-24. DOI: http://pralab.diee.unica.it/en/node/667

Joseph, T., Kalaiselvan, S.A., Aswathy, S.U., Radhakrishnan, R. and Shamna, A.R., 2021. A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment. Journal of Ambient Intelligence and Humanized Computing, 12(6): 6141 6149. DOI: https://ouci.dntb.gov.ua/en/works/7BmAXJg9/

Kumar, P., Singhal, A., Saini, R., Roy, P.P. and Dogra, D.P., 2018. A pervasive electroencephalography-based person authentication system for cloud environment. Displays, 55: 64-70. DOI: https://www.sciencedirect.com/science/article/abs/pii/S0141938222000506#!

Venkatachalam, K., Prabu, P., Almutairi, A. and Abouhawwash, M., 2021. Secure biometric authentication with de-duplication on distributed cloud storage. PeerJ Computer Science. 7: 569. DOI: https://peerj.com/articles/cs-569/

Ilankumaran, S. and Deisy, C., 2019. Multi-biometric authentication system using finger vein and iris in cloud computing. Cluster Computing, 22(1): 103 117. DOI: https://dl.acm.org/doi/abs/10.1007/s10586-018-1824-9

Bartuzi, E. and Trokielewicz, M., 2021. Multispectral hand features for secure biometric authentication systems. Concurrency and Computation: Practice and Experience, 33(18): 6471. DOI: https://www.researcher-app.com/paper/8283752

Ali, Z., Hossain, M.S., Muhammad, G., Ullah, I., Abachi, H. and Alamri, A., 2018. Edge-centric multimodal authentication system using encrypted biometric templates. Future Generation Computer Systems, 85:76 87. DOI: https://pure.ulster.ac.uk/ws/portalfiles/portal/71152905/Multimodal_biometrics.pdf

Pan, H., Lei, Y. and Jian, C., 2018. Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing, 2018(1):1-10. DOI: https://www.academia.edu/44376740/A_new_block_cipher_for_image_encryption_based_on_multi_chaotic_systems

Shankar, K., Lakshmanaprabu, S.K., Gupta, D., Khanna, A. and de Albuquerque, V.H.C., 2020. Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, 32(4): 5122. DOI: https://onlinelibrary.wiley.com/doi/10.1002/cpe.5122

Kaur, A., Jain, S. and Goel, S., 2020. Sandpiper optimization algorithm: a novel approach for solving real-life engineering problems. Applied Intelligence, 50(2): 582-619.

DOI: https://dl.acm.org/doi/abs/10.1007/s10489-019-01507-3

Tang, C., Luktarhan, N. and Zhao, Y., 2020. Saae-Dnn: Deep Learning Method on Intrusion Detection. Symmetry, 12(10): 1695. DOI: https://www.mdpi.com/2073-8994/12/10/1695

Prabhu.D, Vijay Bhanu.S, Suthir.S, 2022. Privacy preserving steganography based biometric authentication system for cloud computing environment, Measurements Sensors. 24: 100511. Elsevier. DOI: https://www.sciencedirect.com/science/article/pii/S2665917422001453?via%3Dihub

Sunil Kumar Muttoo., Nisha, Archana Singhal. 2023. A novel privacy preserving technique using steganography and L – diversity for relations educational dataset. International Journal of Information Technology 15: 3307–3325 Springer. DOI: https://link.springer.com/article/10.1007/s41870-023-01305-8

Mohamed, and Ashiba. Hazzan A Youness, Huda Ashiba. 2023. Proposed homomorphic DWT for cancellable palm print recognition technique. Multimedia Tools and Applications. Springer. DOI:https://link.springer.com/article/10.1007/s11042-023-15710-5

Downloads

Published

2023-10-24

Issue

Section

Articles

How to Cite

MODELING OF OPTIMAL MULTI KEY HOMOMORPHIC ENCRYPTION WITH DEEP LEARNING BIOMETRIC BASED AUTHENTICATION SYSTEM FOR CLOUD COMPUTING. (2023). ASEAN Engineering Journal, 13(4), 149-156. https://doi.org/10.11113/aej.v13.20160