Open Access Open Access  Restricted Access Subscription or Fee Access

Efficient User Authentication in Multi user Cloud using Fingerprint and Merkle Hash Algorithm

K. Preethi, N. Premalatha, T. Saraswathi, V. Srisivaranjani, H. Jeyamohan


Cloud Computing has  been  envisioned  as  the  next  generation  architecture  of  the  IT  enterprise due  to   its   on demand self-service, ubiquitous network access,  location-independent resource pooling , rapid resource elasticity   and  usage-based pricing . The  fundamental  aspect  of  cloud  storage  computing model is  that  data  is  being centralized  or  outsourced  into  the cloud without  the  burden of  local  hardware  and  software management  thereby  new  and  challenging  threat on data arises. Fingerprint  Authentication , a significant  security element  and  popular  biometric  modality  which  is  used  extensively  in  several  applications  for  person authentication,  providing  high uniqueness  and  acceptable performance. In existing  system  the  security  of  fingerprint  data  is not  highly  ensured . In this project a new approach of remote user fingerprint authentication scheme using the concept of Merkle Hash Tree has been proposed. The data owner stores the file in an encrypted form in the cloud server. The cloud user has to register with the owner along with the root signature. In the client side, the Fingerprint template is split it into eight shares using image processing technique. The splitted eight shares are given as inputs to merkle hash tree wherein each share has to undergo hashing function and hence root signature is generated. The signature is generated and stored in the cloud server. The user has to submit the adjacent and sibling shares of fingerprint template for authentication purpose. The signature is generated in the cloud service provider and thus verified with the stored signature in the cloud. The misuse of sensitive data can be   avoided and this provides an effective and efficient user remote authentication with the cloud.


Cloud Computing, Finger Print, Root Signature, Biometric, Authentication.

Full Text:



S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving AccessControl with Authentication for Securing Data in Clouds,” Proc.IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.

C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “TowardSecure and Dependable Storage Services in Cloud Computing,”IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June 2012.

R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M.Kirchberg, Q. Liang, and B.S. Lee, “Trustcloud: A Framework for Accountability and Trust in Cloud Computing,” HP Technical Report HPL-2011-38,, 2013.

R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,” Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 282-292, 2010.

D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access Controls,” Proc.15th Nat’l Computer Security Conf., 1992.

D.R. Kuhn, E.J. Coyne, and T.R. Weil, “Adding Attributes to Role-Based Access Control,” IEEE Computer, vol. 43, no. 6, pp. 79-81,June 2010.

M. Li, S. Yu, K. Ren, and W. Lou, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings,” Proc. Sixth Int’l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), pp. 89-106, 2010.

S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 261-270, 2010.

G. Wang, Q. Liu, and J. Wu, “Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services,” Proc. 17th ACM Conf. Computer and Comm. Security (CCS), pp. 735-737, 2010.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.