{"title":"云存储共享中的生物密码认证","authors":"M. Velciu, Alecsandru Patrascu, V. Patriciu","doi":"10.1109/SACI.2014.6840054","DOIUrl":null,"url":null,"abstract":"One of the relative recent approaches for enhancing the modern cryptosystems security is to add the biometrics layer to the existing cryptographic infrastructures. The Biometric Encryption process proposes to combine the soft biometrics with existing cryptographic keys, overcoming many of the traditional biometric systems vulnerabilities. In this paper we propose a new and novel implementation for a bio-cryptographic infrastructure, as a safer authentication mechanism for Cloud storage sharing. We talk about the architecture of our approach and we emphasize the benefits brought by combining the two fields, such as storage encryption and access control. Our implementation resides on a voice-based authentication mechanism, which confers access to the system and allows the recovery of the shared access storage encryption key.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Bio-cryptographic authentication in cloud storage sharing\",\"authors\":\"M. Velciu, Alecsandru Patrascu, V. Patriciu\",\"doi\":\"10.1109/SACI.2014.6840054\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the relative recent approaches for enhancing the modern cryptosystems security is to add the biometrics layer to the existing cryptographic infrastructures. The Biometric Encryption process proposes to combine the soft biometrics with existing cryptographic keys, overcoming many of the traditional biometric systems vulnerabilities. In this paper we propose a new and novel implementation for a bio-cryptographic infrastructure, as a safer authentication mechanism for Cloud storage sharing. We talk about the architecture of our approach and we emphasize the benefits brought by combining the two fields, such as storage encryption and access control. Our implementation resides on a voice-based authentication mechanism, which confers access to the system and allows the recovery of the shared access storage encryption key.\",\"PeriodicalId\":163447,\"journal\":{\"name\":\"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SACI.2014.6840054\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SACI.2014.6840054","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Bio-cryptographic authentication in cloud storage sharing
One of the relative recent approaches for enhancing the modern cryptosystems security is to add the biometrics layer to the existing cryptographic infrastructures. The Biometric Encryption process proposes to combine the soft biometrics with existing cryptographic keys, overcoming many of the traditional biometric systems vulnerabilities. In this paper we propose a new and novel implementation for a bio-cryptographic infrastructure, as a safer authentication mechanism for Cloud storage sharing. We talk about the architecture of our approach and we emphasize the benefits brought by combining the two fields, such as storage encryption and access control. Our implementation resides on a voice-based authentication mechanism, which confers access to the system and allows the recovery of the shared access storage encryption key.