CFP last date
20 May 2024
Reseach Article

A User Identification Technique to Access Big Data using Cloud Services

by Manu A R, V K Agrawal, K N Balasubramanya Murthy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 1
Year of Publication: 2014
Authors: Manu A R, V K Agrawal, K N Balasubramanya Murthy
10.5120/15846-4730

Manu A R, V K Agrawal, K N Balasubramanya Murthy . A User Identification Technique to Access Big Data using Cloud Services. International Journal of Computer Applications. 91, 1 ( April 2014), 19-30. DOI=10.5120/15846-4730

@article{ 10.5120/15846-4730,
author = { Manu A R, V K Agrawal, K N Balasubramanya Murthy },
title = { A User Identification Technique to Access Big Data using Cloud Services },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 1 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 19-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number1/15846-4730/ },
doi = { 10.5120/15846-4730 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:39.246299+05:30
%A Manu A R
%A V K Agrawal
%A K N Balasubramanya Murthy
%T A User Identification Technique to Access Big Data using Cloud Services
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 1
%P 19-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an `authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system using the consumer authentication architecture diagrams, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

References
  1. Chris Roberts, "Biometric attack vectors and defences", computers & security, Elsevier, Science Direct, 26 (2007) 14 – 25, 2007 Elsevier Ltd.
  2. "Biometric statistics in focus", Feature article in Science direct (Elsevier) 2010.
  3. "The right biometric", survey, article in Science direct (Elsevier) Biometric Technology Today , March 2006.
  4. M Y SIYAL, "A biometric based e-security system for internet-based applications", "http://www. wseas. us/e-library/conferences/joint2002/451-208. pdf" .
  5. Koval, S. Voloshynovskiy, and T. Pun "Error exponent analysis of person identification based on fusion of dependent/independent modalities CUI-University of Geneva, Stochastic Image Processing Group, 24 rue General-Dufour, 1211 Geneva, Switzerland, "http://spie. org/samples/FirstPage/PSISDG/6819/68190P_sample. pdf", 2007.
  6. Andreas Pfitzmann, "Biometrics – How to Put to Use and How Not at All?", Trust, Privacy and Security in Digital Business, Lecture Notes in Computer Science Volume 5185, 2008, pp 1-7 , http://link. springer. com/chapter/10. 1007%2F978-3-540-85735-8_1.
  7. Anil K. Jain, Arun Ross and Sharath Pankanti, "Biometrics: A Tool for Information Security", IEEE transactions on information forensics and security, VOL. 1, NO. 2, JUNE 2006.
  8. Ayu Tiwari, Sudip Sanyal, Ajith Abraham, Svein Knapskog, Sugata Sanyal, "A Multifactor Security Protocol for Wireless payament secure web authentication using mobile devices", ISBN: 978-972-8924-30-0 © 2007 IADIS, International Conference Applied Computing 2007, http://www. tifr. res. in/~sanyal/papers/Ayu_MultiFactorSecurityProtocol. pdf.
  9. James Wayman, Anil Jain, Davide Maltoni and Dario Maio, "An Introduction to Biometric. Authentication Systems", http://www. springer. com/cda/content/document/cda_downloaddocument/9781852335960-c1. pdf?SGWID=0-0-45-130566-p2275653.
  10. Dinesha H A, Dr. V. K Agrawal, "Multi-dimensional Password Generation Technique for accessing cloud services", Special Issue on: "Cloud Computing and Web Services", International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol. 2, No. 3, June 2012, 31-39.
  11. X. Suo, Y. Zhu, G. S. Owen, "Graphical passwords: A survey," in Proc. 21st Annual Computer Security Application. Conf. Dec. 5–9, 2005, pp. 463–472.
  12. S. Wiedenbeck, J. Waters, J. -C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Basic results," in Proc. Human-Comput. Interaction Int. , Las Vegas, NV, Jul. 25–27,2005.
  13. Fawaz A. Alsulaiman and Abdulmotaleb El Saddik,"Three-Dimensional Password for More Secure Authentication", Instrumentation and Measurement, IEEE Transactions , 03 April 2008, 57 , Issue:9, 1929 – 1938.
Index Terms

Computer Science
Information Sciences

Keywords

Multi-dimensional multi-level security systems multiple privilege levels multi-factor passwords multi-modal biometrics cloud computing big data intelligence security and privacy.