An Efficient Multi-Mode Three Phase Biometric Data Security Framework For Cloud Computing-Based Servers

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2020 by IJETT Journal
Volume-68 Issue-9
Year of Publication : 2020
Authors : Ayesha Tarannum, Md. Zia Ur Rahman, Srinivasulu T
DOI :  10.14445/22315381/IJETT-V68I9P203

Citation 

MLA Style: Ayesha Tarannum, Md. Zia Ur Rahman, Srinivasulu T  "An Efficient Multi-Mode Three Phase Biometric Data Security Framework For Cloud Computing-Based Servers" International Journal of Engineering Trends and Technology 68.9(2020):10-17. 

APA Style:Ayesha Tarannum, Md. Zia Ur Rahman, Srinivasulu T. An Efficient Multi-Mode Three Phase Biometric Data Security Framework For Cloud Computing-Based Servers International Journal of Engineering Trends and Technology, 68(9),10-17.

Abstract
In public and private cloud servers, multimedia data is increasing day by day and it is hard to provide security properly because of limited storage capacity problems. So, to avoid these storage and security problems, conventional single biometric and various biometric model are used. These conventional models are depending on data size and file format with existed integrity and confidential methods on limited cloud data types. Therefore, to overcome these problems, integrity based a three stage multi use multi modal (MUMM) secured frame work along with large cloud data types is proposed. In the proposed work, to execute a strong data security system on cloud databases biometric images like IRIS and finger knuckle features are utilized. For improving large data security, classification-based CNN, hybrid feature extraction measures, integrity and encryption-based methods are used. Then results shows that proposed model has preferable efficiency compared to conventional multi modular security models for large data cloud data files and it has accomplished positive rate of 0.987, integrity bit variation of 8.7% and better runtime compared existed models.

Reference

[1] M. Ali, J. Mohajeri, M.-R. Sadeghi, and X. Liu, “A fully distributed hierarchical attribute-based encryption scheme,” Theoretical Computer Science, vol. 815, pp. 25–46, May 2020, doi: 10.1016/j.tcs.2020.02.030.
[2] V. K. Arthur Sandor, Y. Lin, X. Li, F. Lin, and S. Zhang, “Efficient decentralized multi-authority attribute-based encryption for mobile cloud data storage,” Journal of Network and Computer Applications, vol. 129, pp. 25–36, Mar. 2019, doi: 10.1016/j.jnca.2019.01.003.
[3] S. Belguith, N. Kaaniche, M. Laurent, A. Jemai, and R. Attia, “PHOABE: Securely outsourcing multi-authority attribute-based encryption with policy hidden for cloud assisted IoT,” Computer Networks, vol. 133, pp. 141–156, Mar. 2018, doi: 10.1016/j.comnet.2018.01.036.
[4] Salman M.N., Trinatha Rao P., Ur Rahman M.Z.,’Adaptive noise cancellers for cardiac signal enhancement for IOT based health care systems’,Journal of Theoretical and Applied Information Technology,vol.95,no.10,PP.2206- 2213, 2017.
[5] J. Cui, H. Zhou, Y. Xu, and H. Zhong, “OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud,” Information Sciences, vol. 489, pp. 63–77, Jul. 2019, doi: 10.1016/j.ins.2019.03.043.
[6] K. Dhal, S. C. Rai, and P. K. Pattnaik, “LIKC: A liberty of encryption and decryption through imploration from Kcloud servers,” Journal of King Saud University - Computer and Information Sciences, Feb. 2020, doi: 10.1016/j.jksuci.2020.01.011.
[7] N. Eltayieb, R. Elhabob, A. Hassan, and F. Li, “An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid,” Journal of Systems Architecture, vol. 98, pp. 165–172, Sep. 2019, doi: 10.1016/j.sysarc.2019.07.005.
[8] Putluri S., Rahman M.Z.U., Fathima S.Y.,”Computer based genomic sequences analysis using least mean forth adaptive algorithms”,Journal of Theoretical and Applied Information Technology, vol.95, no.9,PP.2006-2014, 2017.
[9] Q. He, N. Zhang, Y. Wei, and Y. Zhang, “Lightweight attribute-based encryption scheme for mobile cloud assisted cyber-physical systems,” Computer Networks, vol. 140, pp. 163–173, Jul. 2018, doi: 10.1016/j.comnet.2018.01.038.
[10] Kiran P.S., Komala G., Aneesh C.R.S.D., Rao S.K.,”Electroencephalogram signal analysis using wavelet transform and statistical signal processing”,Journal of Advanced Research in Dynamical and Control Systems,vol.9, no.2, 2017.
[11] Prasad K.V., Prasad G.R.K., Kranthiveer D., Sowmya D., Nikesh M., Sailesh T.V.,’ECG signal acquisition and analysis for portable heart monitoring devices’,Journal of Advanced Research in Dynamical and Control Systems, vol.9, no.14,PP.1685-1693,2017.
[12] Vidya Sagar Y., Chaitresh K., Baba Eleyas Ahamad S., Tejaswi M.,”Validation of signals using principal component analysis”,International Journal of Applied Engineering Research, vol.12, no.1,PP.391-398, 2017.
[13] M. H. Le, V. D. Tran, V. A. Trinh, and V. C. Trinh, “Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption,” Theoretical Computer Science, vol. 804, pp. 219–235, Jan. 2020, doi: 10.1016/j.tcs.2019.11.034.
[14] M. Hammad and K. Wang, “Parallel score fusion of ECG and fingerprint for human authentication based on convolution neural network,” Computers & Security, vol. 81, pp. 107–122, Mar. 2019, doi: 10.1016/j.cose.2018.11.003.
[15] M. Hammad, S. Zhang, and K. Wang, “A novel twodimensional ECG feature extraction and classification algorithm based on convolution neural network for human authentication,” Future Generation Computer Systems, vol. 101, pp. 180–196, Dec. 2019, doi: 10.1016/j.future.2019.06.008.
[16] Putluri S., Ur Rahman M.Z., Fathima S.Y., “Cloud-based adaptive exon prediction for DNA analysis”,Healthcare Technology Letters, vol.5, no.1,PP. 25- 30, 2018.
[17] Salman N.M., Trinatha Rao P., Ur Rahman Z., “Novel logarithmic reference free adaptive signal enhancers for ECG analysis of wireless cardiac care monitoring systems”,IEEE Access, vol.6,PP. 46382- 46395,2018.
[18] Rao G.A., Syamala K., Kishore P.V.V., Sastry A.S.C.S., “Deep convolutional neural networks for sign language recognition”, Conference on Signal Processing and Communication Engineering Systems, SPACES 2018, PP. 194- 197,2018.
[19] Kumar E.K., Sastry A.S.C.S., Kishore P.V.V., Kumar M.T.K., Kumar D.A., “Training CNNs for 3-D Sign Language Recognition with Color Texture Coded Joint Angular Displacement Maps”,IEEE Signal Processing Letters, vol.25, no.5,PP. 645- 649,2018.
[20] Cheerla S., Venkata Ratnam D., Teja Sri K.S., Sahithi P.S., Sowdamini G., “Neural network based indoor localization using Wi-Fi received signal strength”,Journal of Advanced Research in Dynamical and Control Systems, vol.10,no.4,PP. 374- 379,2018.
[21] Babu Sree Harsha P., Venkata Ratnam D., “Fuzzy logicbased adaptive extended kalman filter algorithm for GNSS receivers”, Defence Science Journal, vol.68,no.6,PP. 560- 565, 2018.
[22] Gayathri N.B., Thumbur G., Rajesh Kumar P., Rahman M.Z.U., Reddy P.V., Lay-Ekuakille A., “Efficient and Secure Pairing-Free Certificateless Aggregate Signature Scheme for Healthcare Wireless Medical Sensor Networks”, IEEE Internet of Things Journal, vol.6,no.5, PP.9064- 9075,2019.
[23] Tarannum A., Rahman M.D., “Multi-modal biometric system using Iris, Face and fingerprint images for highsecurity application”, International Journal of Recent Technology and Engineering, vol.7, no.6, PP.314-320,2019.
[24] Ahammad S.K.H., Rajesh V., Ur Rahman M.Z., “Fast and Accurate Feature Extraction-Based Segmentation Framework for Spinal Cord Injury Severity Classification”, IEEE Access, vol.7, PP.46092-46103,2019.
[25] Thumbur G., Gayathri N.B., Vasudeva Reddy P., Zia Ur Rahman M.D., Lay-Ekuakille A., “Efficient pairing-free identity-based ADS-B authentication scheme with batch verification”, IEEE Transactions on Aerospace and Electronic Systems, vol.55, no.5, PP.2473-2486,2019.
[26] Suresh B., Manorama M., Bhupesh M.M., Sai Kiran K., Chandra Sekhar Yadav G.V.P., Ghali V.S., “Advanced signal processing approaches for quadratic frequency modulated thermal wave imaging”, International Journal of Emerging Trends in Engineering Research, vol.7, no.11, PP.599-603, 2019.
[27] Srivani I., Siva Vara Prasad G., Venkata Ratnam D., “A Deep Learning-Based Approach to Forecast Ionospheric Delays for GPS Signals”, IEEE Geoscience and Remote Sensing Letters, vol.16, no.8, PP.1180-1184,2019.
[28] Narayana V.V., Ahammad S.H., Chandu B.V., Rupesh G., Naidu G.A., Gopal G.P., “Estimation of quality and intelligibility of a speech signal with varying forms of additive noise”, International Journal of Emerging Trends in Engineering Research, vol.7, no.11, PP.430-433, 2019.

Keywords
Biometric authentication, cloud computing, cyber physical system, convolutional neural network, multi-mode security.