![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Efficient User Authentication in Multi user Cloud using Fingerprint and Merkle Hash Algorithm
Subscribe/Renew Journal
Cloud Computing has been envisioned as the next generation architecture of the IT enterprise due to its on demand self-service, ubiquitous network access, location-independent resource pooling , rapid resource elasticity and usage-based pricing . The fundamental aspect of cloud storage computing model is that data is being centralized or outsourced into the cloud without the burden of local hardware and software management thereby new and challenging threat on data arises. Fingerprint Authentication , a significant security element and popular biometric modality which is used extensively in several applications for person authentication, providing high uniqueness and acceptable performance. In existing system the security of fingerprint data is not highly ensured . In this project a new approach of remote user fingerprint authentication scheme using the concept of Merkle Hash Tree has been proposed. The data owner stores the file in an encrypted form in the cloud server. The cloud user has to register with the owner along with the ischolar_main signature. In the client side, the Fingerprint template is split it into eight shares using image processing technique. The splitted eight shares are given as inputs to merkle hash tree wherein each share has to undergo hashing function and hence ischolar_main signature is generated. The signature is generated and stored in the cloud server. The user has to submit the adjacent and sibling shares of fingerprint template for authentication purpose. The signature is generated in the cloud service provider and thus verified with the stored signature in the cloud. The misuse of sensitive data can be avoided and this provides an effective and efficient user remote authentication with the cloud.
Keywords
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 388
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 2