[go: up one dir, main page]

Ogban et al., 2015 - Google Patents

Implementation of a biometric authentication layer for a public cloud FU Ogban and IS Nti

Ogban et al., 2015

View PDF
Document ID
11490697906196236692
Author
Ogban F
Nti I
Publication year

External Links

Snippet

Biometric authentication method is a scheme that can be incorporated into traditional method of securing public cloud. Securing the cloud is an important task and critical aspect as it faces numerous security issues and challenges. Compromise of user's account has …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
US10277591B2 (en) Protection and verification of user authentication credentials against server compromise
US10268809B2 (en) Multi-factor user authentication framework using asymmetric key
Anakath et al. Privacy preserving multi factor authentication using trust management
KR101556069B1 (en) Out-of-band remote authentication
CN106537403B (en) System for accessing data from multiple devices
US9286455B2 (en) Real identity authentication
Al Tayeb et al. The impact of cloud computing technologies in e-learning
JP2017517823A (en) Techniques for operating services with machine-generated authentication tokens
Singh et al. A secure multi-tier authentication scheme in cloud computing environment
Ghazizadeh et al. Trusted computing strengthens cloud authentication
Farooq A Review on cloud computing security using authentication techniques.
Alshar'e et al. A user protection model for the trusted computing environment
Bicakci et al. Towards zero trust: The design and implementation of a secure end-point device for remote working
Chauhan et al. Secure data in cloud computing using face detection and fingerprint
Ogban et al. Implementation of a biometric authentication layer for a public cloud FU Ogban and IS Nti
Edwards et al. FFDA: A novel four-factor distributed authentication mechanism
Balaram Cloud computing authentication techniques: A survey
Raji et al. Enhancing Public Cloud Security by Developing a Model For User Authentication and Data Integrity Checking
Dhamija et al. SSQS and OTP based user authentication mechanism in cloud computing
Chakrawarti et al. The architechtural framework for public cloud security
Pravinbhai Implementation of multi-tier authentication technique for single-sign on access of cloud services
Pabon Prevent Cyberattacks in Commercial Aircrafts Using a Biometric Provenance Access Control Framework
Chhetiza et al. A Survey of Security Issues and Authentication Mechanism in Cloud Environment with Focus on Multifactor Authentication
Karmakar et al. An examination of Cloud Network Security Issues and Potential Solutions
Nyamwaro Application for enhancing confidentiality and availability for sensitive user data using AES algorithm in smartphone devices