Biometric Based Collusion- Resistant Control for Implement Encrypted Cloud Storage

  • Thimmisetty Swathi, P. Sreedhar

Abstract

With the rapid growth of smart devices equipped with biometric sensors, the customer identification system uses biometric features. It widely adopted in various applications. Among the many vital characteristics, fingerprint recognition systems were widespread Studied and published. Biometric identification has become more prevalent in recent years. With the development from cloud computing, database owners are encouraged to outsource a large amount of biometric data and Identification tasks to the cloud to get rid of expensive storage and computing costs, which brings potential threats to user privacy. In this paper, we suggest maintaining efficiency and privacy Identification scheme outsourcing. Specifically, biometric data is encrypted and outsourced to a cloud server. To implement identification, the database owner encrypts the query and data. The cloud performs identification operations on the encrypted database and returns it Result for the database owner. A comprehensive safety analysis indicates that the proposed scheme is even safe If attackers could falsify identity requests and cooperate with the cloud. Compared to the previous protocols, Experimental results show that the proposed system performs better both in preparation and in Identification procedures.

Published
2020-05-28
How to Cite
Thimmisetty Swathi, P. Sreedhar. (2020). Biometric Based Collusion- Resistant Control for Implement Encrypted Cloud Storage . International Journal of Advanced Science and Technology, 29(05), 9566-9572. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/19121