Biometric Smartcard Authentication for Fog Computing
نویسندگان
چکیده
منابع مشابه
Towards Biometric-based Authentication for Cloud Computing
Cloud computing is an emerging technology that allows different service providers to offer services in an on-demand environment. Due to the advantages such as flexibility, mobility, and costs saving, the number of cloud user has increased tremendously. Consequently, a more secure and privacy preserving authentication system is becoming important to ensure that only the data owner or the authori...
متن کاملBiometrics Authentication with Smartcard
The purpose of this paper is to highlight and solve issues concerning the biometric information for authentication and their use with smartcards.
متن کاملSecurity Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication
The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity. In such a biometrics-based cardholder authentication system, sensitive data may be transferred between the smartcard and the card reader. In this paper we identify and classify possible threats to the communications link between card and card reader duri...
متن کاملProviding Authentication by Using Biometric Multimodal Framework for Cloud Computing
As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, Cloud Computing has some security issues such as virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and au...
متن کاملSecure Login Using Multi-Tier Authentication Schemes in Fog Computing
Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Network Security & Its Applications
سال: 2018
ISSN: 0975-2307,0974-9330
DOI: 10.5121/ijnsa.2018.10604