Enhance the Security of Data Storage and Retrieval in Cloud Computing Through Authentication Based Encryption
J. Sai Geetha
Dr. J.Sai Geetha, Dept of Information Technology, Bishop Heber College, Tiruchirappalli, Tamil Nadu, India,

Manuscript received on November 17., 2019. | Revised Manuscript received on November 24 2019. | Manuscript published on 30 November, 2019. | PP: 11927-11931 | Volume-8 Issue-4, November 2019. | Retrieval Number: D9802118419/2019©BEIESP | DOI: 10.35940/ijrte.D9802.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The digital computing infrastructure is rapidly moving towards cloud based architecture. The protection of data is becoming a difficult task in the current scenario as more and more confidential and sensitive data is stored in cloud environment and transmitted between cloud users. In a cloud computing environment, the entire data reside over a set of networked resources of remote servers and locations. These data has been accessed by unauthorized cloud users through virtual machines. To provide additional level of cloud data security, Biometric based authentication with encryption using public key cryptography is proposed in this paper. The proposed model Authentication Based Encryption (ABE) helps to enhance the security of data as well as the authentication of cloud user. The sensitive data is initially encrypted and then stored secretly with biometric finger print image. The resultant image is transmitted through the in-secured channel. However to avoid unauthorized access, the image is decomposed and stored in cloud separately as encrypted message and finger print. Before beginning the decryption process, the finger print of the cloud user is being compared with the stored image for authentication. If the match is found, the encrypted data is decrypted by the authenticated cloud user. Otherwise access to the data is denied to ensure security. Thus, the proposed framework provides an additional level of protection to public key algorithm with authentication.
Keywords: Cloud Computing, Communication and storage security, biometric based Image Encryption and Decryption, Public key cryptography and authentication.
Scope of the Article: Cloud Computing.