Abstract
In this contribution, we introduce an application that allows a mobile phone to be used as a biometric-capture device for secure access to the cloud. In this application, the biometric capture and recognition are performed during a standard web session, using JQuery, a new mobile web framework which provides the technology needed to build web pages that act more like mobile applications rather than traditional web pages. The mobile user obtains service catalog through an interface developed for the Android system. We have used Hadoop, an open source cloud computing environment, to establish the connection between mobile user and server in the cloud via Ethernet, WiFi or 3G.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wright, A.: Get smart. Communications of the ACM 52, 15–16 (2009)
Godbole, R.M., Pais, A.R.: Secure and efficient protocol for mobile payments. In: Proc. 10th Int. Conf. Electron. Commerce, vol. 1, pp. 1–10 (2008)
Song, W., Su, X.: Review of mobile cloud computing. IEEE (2011)
Senk, C., Dotzler, F.: Biometric authentication as a service for enterprise identity management deployment. In: 2011 Sixth International Conference on Availability, Reliability and Security, vol. 7 (2011)
Vivaracho-Pascual, C., Pascual-Gaspar, J.: On the use of mobile phones and biometrics for accessing restricted web services. IEEE Transactions on Systems, Man, and Cybernetics 10 (2010)
Park, K.R., Jeong, D.S., Park, H.-A., Kim, J.: Iris recognition in mobile phone based on adaptive gabor filter. LNCS, vol. 3, pp. 457–463 (2005)
Zhang, Q., Moita, J.N., Mayes, K., Markantonakis, K.: The secure and multiple payment system based on the mobile phone platform. Presented at Workshop Inf. Secur. Appl., Jeju Island, Korea, vol. 1 (2004)
Park, K.R., Park, H.A., Kang, B.J., Lee, E.C., Jeong, D.S.: A study on iris localization and recognition on mobile phones. EURASIP J. Adv.Signal Process 1, 1–11 (2008)
Martinez Diaz, M., Fierrez, J., Galbally, J., OrtegaGarcia, J.: Towards mobile authentication using dynamic signature verification:useful features and performance evaluation. In: Proc. 19th Int. Conf. Pattern Recogn., vol. 1, pp. 1–5 (2008)
Hurley, D.J., Arbab-Zabar, B., Nixon, M.S.: The ear as a biometric. In: Handbook on Biometrics, vol. 1, pp. 131–150 (2008)
Han, S.-y., Park, H.-A., Cho, D.-h., Park, K.R., Lee, S.: Face Recognition Based on Near-Infrared Light Using Mobile Phone. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007, Part II. LNCS, vol. 4432, pp. 440–448. Springer, Heidelberg (2007)
Gonzalez-Rodriguez, J., Toledano, D.T., Ortega-Garcia, J.: Voice biometrics. In: Handbook on Biometrics, pp. 151–170. Springer (2008)
Enhancing security for the mobileworkforce. Biometric Technology Today 16, 8 (2008)
Shelly, Raghava, N.S.: Iris recognition on hdaoop:a biometrivs system implementation on cloud computing. In: Proceedings of IEEE CCIS 2011, vol. 11, p. 8 (2011)
Apache Hadoop Web Site, http://hadoop.apache.org/common/docs/r0.17.0/mapredtutorial.html#mapper
Doyle, M.: Master mobile web apps with jquery mobile. In: Proceedings of IEEE CCIS 2011, vol. 1111, p. 11 (2011)
Ramann, R., Vielhauer, F., Steinmetz, C.: Biometric applications based on handwriting. In: IEEE International Conference, vol. 2 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Omri, F., Hamila, R., Foufou, S., Jarraya, M. (2012). Cloud-Ready Biometric System for Mobile Security Access. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30567-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-30567-2_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30566-5
Online ISBN: 978-3-642-30567-2
eBook Packages: Computer ScienceComputer Science (R0)