Reference Hub5
Biometrics-Based Un-Locker to Enhance Cloud Security Systems

Biometrics-Based Un-Locker to Enhance Cloud Security Systems

Ashima Narang, Deepali Gupta, Amandeep Kaur
Copyright: © 2020 |Volume: 10 |Issue: 4 |Pages: 12
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781799807766|DOI: 10.4018/IJCAC.2020100101
Cite Article Cite Article

MLA

Narang, Ashima, et al. "Biometrics-Based Un-Locker to Enhance Cloud Security Systems." IJCAC vol.10, no.4 2020: pp.1-12. http://doi.org/10.4018/IJCAC.2020100101

APA

Narang, A., Gupta, D., & Kaur, A. (2020). Biometrics-Based Un-Locker to Enhance Cloud Security Systems. International Journal of Cloud Applications and Computing (IJCAC), 10(4), 1-12. http://doi.org/10.4018/IJCAC.2020100101

Chicago

Narang, Ashima, Deepali Gupta, and Amandeep Kaur. "Biometrics-Based Un-Locker to Enhance Cloud Security Systems," International Journal of Cloud Applications and Computing (IJCAC) 10, no.4: 1-12. http://doi.org/10.4018/IJCAC.2020100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the increasing demand for cloud computing, its challenges are also increasing, and security is one of the preeminent concerns. A number of approaches were introduced earlier to secure cloud storage systems, but many of them failed to provide security effectively and even emanate the concern of cost. Efficiency and cost are the essential features for any cloud system and demand for a security mechanism. To accomplish this objective, a novel feature is introduced with a concept of biometric authentication and named as ‘biometric-based un-locker'. Biometrics entities are unique in nature, so it will be the best and most cost-effective solution for the cloud. The performance of this proposed system is analyzed by generating a cloud environment and implementing it using the .NET framework on five different datasets. The results are calculated with both attackers and normal users, and performance is analyzed on the basis of time, size of data after encryption, and authentication rate. Results show that the proposed system effectively provides security and is also very cost-efficient.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.