Sei sulla pagina 1di 6

SYNOPSIS

1. Group Id: PID08

2. Project Title: Providing Biometric Authentication as a Service for cloud


account

3. Project Option: Internal

4. Internal Guide: Prof. Chaya Jadhav

5. Sponsorship and External Guide: None

6. Technical Keywords:

6.1. General:

Biometric Authentication

Outsourceable two party Privacy preserving of data

6.2. Software:

1) JDK 7 or above

2) JCreator

3) apache tomcat 4 or above

6.3. Hardware:

1) Fingerprint Scanner

7. Problem Statement: To provide a secure light weight biometric authentication service


to access a cloud account.

8. Abstract :

The problem of fake logging in and data thefts is a major issue that cloud users are
facing. To protect the privacy and for providing security, there is a need to authenticate the user
that requests access to an account. However, the techniques used for authentication so far were

1
not capable to guarantee the same and thereby kept the data at high risks. So, we are using the
concept of Biometric authentication along with some additional concepts of privacy
preservation to provide a more secure log in. This project also provides a feature by using
which fingerprint can be recognised even if the orientation is changed.

9. Goals and Objectives :

1. Study of Cloud account security issues.

2. Study of Client and Server communication on web.

3. Study of light weight options for communication.

4. Study of encryption and decryption algorithms for image as well as character data.

5. Study of fingerprint recognition system along with the feature of orientation change.

6. Study of techniques of file Compression and storage on cloud.

10. Relevant mathematics associated with the Project :

10.1 System description:

1. Let S=I, P, O, V, F be the system.

2. Let I be the input I=A, B, C

A = registration ID given by Client.

B= Password provided by the client.

C= Fingerprints provide by the client.

Let P be the process

3. Let P be the process P =L, M, N

L=Search the database for the existence of the requested ID.

M=Check for the validity of the password entered.

N=Match the fingerprints provided during log in with the ones that
were stored in the database during registration.

4. Let O be the output O=P, Q, R

2
P=Connection established after authentication.

Q=request is accepted.

R=Data transmission is done according to the request.

5. Let V be the case of success V=G, H

G=All the input parameters are given correctly.

H=Client validation.

6. Let F be the case of failure F=X,Y

X=Wrong input.

Y=Poor network.

10.2. Benefits:

A. It will help us to improve the security providence on cloud stored data.

B. It will authenticate a user even if the orientation of his fingerprint is changed.

C. It will help us to store the data on cloud in compressed form thereby


improving the memory utilization.

11. Names of Conferences / Journals where papers can be published:

Preparing for Paper Publication.

12. Review of Conference/Journal Papers supporting project idea :

12.1 References :

1. Chandra Shekhar Vorugunti “A Secure and efficient Biometric Authentication as a service


for cloud computing”
2. Hu Chun, Feng Li “Outsourceable two party Privacy preserving Biometric Authentication”
3. Kiran Kumar K, K.B Raja “Hybrid Fingerprint Matching using Block filter and strength
factor”
4. CHENG Hongbing, RONG Chunming “Identity Based Encryption and Biometric
Authentication Scheme for Secure Data Access in Cloud Computing”
5. Krishnaraj M.S Soyjaudah, Md Yaasir “Cloud Computing Authentication using
Cancellable Biometrics”

3
6. Le Wang, Nandita Bhattacharjee “A Method for Fingerprint Alignment and Matching”
7. Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl “Towards Standardised Fingerprint
Matching Robustness Assessment: The StirMark Toolkit – Cross-Database Comparisons with
Minutiae-based Matching”
12.2 Web URLs :

1.https://in.mathworks.com/matlabcentral/answers/125618-simple-matlab-code-for-image-
encryption-and-decryption?requestedDomain=www.mathworks.com

2. http://content.iospress.com/articles/journal-of-intelligent-and-fuzzy-systems/ifs1769
3. http://stackoverflow.com/questions/15561668/image-encryption-using-xor
4. http://searchsmbstorage.techtarget.com/feature/Understanding-cloud-storage-services-A-
guide-for-beginners

13. Plan of Project Execution :

D1: AnandBharati

D2: Ashish Raj

D3: Shreya Gawade

D4: Shweta Madane

13.1 Tasks:

T1. Project definition searching.

T2. Material collection.

T3. Requirement gathering and validating.

T4. Abstract Creation.

T5. Project planning.

T6. System design.

T7. Study of source website.

T8. Deciding platform.

T9. Synopsis generation.

4
T10. Development of necessary modules of software.

T11. Implementing server application.

T12. Integration of encryption algorithm.

T13. Integration of image orientation change based matching.

T14. Testing and debugging of the system.

T15. Implementing client application.

T16. Integration of encryption algorithm.

T17. Client Data hiding during authentication.

T18. Testing and debugging client application.

T19. Testing, debugging delivery of all modules.

T20. Report generation

13.2 Project Planning:

Task Duration Assigned members


T1 7th JULY D1, D2, D3,D4
T2 14th JULY D1, D2, D3,D4
T3 20th JULY D1, D2, D3, D4
T4 26th JULY D1, D2, D3, D4
T5 11th AUGUST D1, D2, D3, D4
T6 10th SEPTEMBER D1, D2, D3, D4
T7 19th SEPTEMBER D1, D2, D3, D4
T8 25th SEPTEMBER D1, D2, D3, D4
T9 28th SEPTEMBER D1, D2, D3, D4
T10 15th DECEMBER D1, D2, D3, D4
T11 20th DECEMBER D1, D2, D3, D4
T12 27th DECEMBER D1, D2, D3, D4
T13 10th JANUARY D1, D2, D3, D4
T14 16th JANUARY D1, D2, D3, D4
T15 3th FEBRUARY D1, D2, D3, D4
T16 18th FEBRUARY D1, D2, D3, D4
T17 26th FEBRUARY D1, D2, D3, D4

5
T18 2th MARCH D1, D2, D3, D4
T19 6th MARCH D1, D2, D3, D4
T20 15th MARCH D1, D2, D3, D4

Potrebbero piacerti anche