International Journal of Electrical and Computer Engineering (IJECE) Vol. No. February 2017, pp. ISSN: 2088-8708. DOI: 10. 11591/ijece. Biometric Identification and Authentication Providence using Fingerprint for Cloud Data Access Amali Mary Bastina1. Rama2 Department of Computer Science. Loyola College. Chennai 600034. India Post Graduate and Research Department of Computer Science. Presidency College. Chennai 600005. India Article Info ABSTRACT Article history: The raise in the recent security incidents of cloud computing and its challenges is to secure the data. To solve this problem, the integration of mobile with cloud computing. Mobile biometric authentication in cloud computing is presented in this paper. To enhance the security, the biometric authentication is being used, since the Mobile cloud computing is popular among the mobile user. This paper examines how the mobile cloud computing (MCC) is used in security issue with finger biometric authentication model. Through this fingerprint biometric, the secret code is generated by entropy value. This enables the person to request for accessing the data in the desk computer. When the person requests the access to the authorized user through Bluetooth in mobile, the Authorized user sends the permit access through fingerprint secret code. Finally this fingerprint is verified with the database in the Desk computer. If it is matched, then the computer can be accessed by the requested person. Received Jul 19, 2016 Revised Oct 22, 2016 Accepted Nov 6, 2016 Keyword: Authentication Biometrics Entropy Fingerprint Mobile cloud computing Copyright A 2017 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Amali Mary Bastina. Department of Computer Science. Loyola College. Chennai 600034. India. Email: amalimarybastina@gmail. INTRODUCTION Sharing of configuration of computer resources is used by cloud computing, it is one of the computer technology that leverages cloud resources for Auenabling ubiquitous, convenient, on-demand network access. That is, sharing the resources is from network servers, storage, applications and services. cloud computing, the definition behind the AucloudAy is proposed by Figure . , it is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers. Nowadays, the utilization of cloud resources under the mobile devices is a recent research approaches to envelope the network process easily it is called Mobile Cloud Computing Figure . The aim of Mobile Cloud Computing is to enhance the mobile dives computing capability and conserve mobile resources such as battery, mobile internal and external storage capability and the vital function is to enhance the data safety to enrich the computing experience of mobile users Figure . Biometric system is one of the pattern recognition techniques, the operation behind the biometric system it obtain through the biometric data from an individual person and extracting the feature set from the obtaining data, and comparing the obtaining feature set is compared to the storage data as template in the database Figure . There are other several biometrics are also available in mobile computing such as DNA. Ear. Face. Fingerprint. Gait, hand and finger geometry. Iris. Keystroke. Odor. Palm print, retinal, signature and voice. Journal homepage: http://iaesjournal. com/online/index. php/IJECE IJECE ISSN: 2088-8708 In this proposed theory, the cloud computing uses Fingerprint based biometric authentication. Here, the particular file which is requested can be accessed by the user through mobile finger authentication. When the requested user, needs to access the particular data in protective folder in computer, he process it through mobile cloud computing with the help of Bluetooth to get authenticated by the Authorized user. The remainder of this paper is organized as follows: Section II deals with literature survey: An overview of MCC and finger print biometric recognition. Section i briefly discuss about proposed methodology. Section IV discuss the Experimental Results and Section V concludes the paper. LITERATURE SURVEY The energy conservation for the mobile device is presented in figure . Here the author and her associates implemented the mobile energy conservation based on executing mobile application in their mobile devices which also means mobile execution or cloud execution. For this process, both the execution asymptotical analysis of the optimal scheduling is also provided. Improvisation of quality of Really Simple Syndication (RSS) reading service for mobile users is described in figure . There are two proposed algorithms: Cloud-assisted pre-fetching and cognitive Fetching of the multimedia content of the RSS for all mobile users are takenin first part, and in the second part, appropriate time is set for pushing the data to mobile users. These processes are well utilized through cloud computing technology. In figure . , the mobile cloud service is provided through optimal resource management tool that maximizes the benefit of the mobile cloud service provider which proposed one of the outlines for the resource allocation to the mobile application, formulate the optimal models though, this maximizes the service provider in the mobile application. Energy efficient link for data Intensive application in mobile cloud computing is presented in figure . , and also for data tolerant application. To optimize data tolerant and data Intensive system, throughout energy consumption is designed by using the discrete-time stochastic dynamic program. This reduces the average energy consumption for packet delivery and implements a scalable approximate dynamic The Security of the internet service is presented in figure . based on cloud mobile computing In this system, securing the internet is through Biometric authentication. The password is created through this method and it is stored as a template. Several techniques are used for this system such as large scale character recognition, algorithm such as k-nearest neighbor, and artificial neural network classifier. In figure . represents the number of authentication techniques. The core designers Weirich and Sasse figure . reports the result of the series of user interviews about password behavior and is also based on phrase arguments to persuade the users who is introduced to adopt a better security behavior. Stanton figure . likewise researched on the users for the purpose of discovering the range of user security behavior in a wide variety of contexts, not just in password choice and its use. In figure . proposed as an identity is based on the encryption and biometric authentication for secure the data in cloud computing. Several steps are presented to access the data that are setting the parameter, key distribution, create the template for features, finally processing the cloud data. Accessing the cloud service is implemented in Figure . , here increasing the security for accessing the data through biometric authentication. Here the researchers secure the data based on the combination of images and texts as a hybrid approach. PROPOSED METHODOLOGY Mobile cloud computing is the integration of the cloud computing and mobile devices, and is also applied by the cloud computing application in mobile application. Figure 1 shows proposed Methodology. Biometric Identification and Authentication Providence Using Fingerprint for A (A. Amali Mary Bastin. A ISSN: 2088-8708 Figure 2. Proposed Methodology Overview of Proposed Framework The proposed model is used for the security purpose efficiently. In this model, the proposed biometric authentication for application execution on the cloud based mobile technology. First, we access a file in the PC. Secondly sending the request for accessing the file. For accessing the file secret code is This secret code is developed using biometric recognition. In this research, fingerprint is used as biometric authentication is developed. The aim of the mobile cloud computing is to give a proxy for mobile clients connecting to Cloud services. This type of methods consists of three parts such as mobile service client, middleware and cloud services. Fingerprint biometric is mostly used in various authentication applications due to the advantage of its best balance among other authentication system and also costing of the fingerprint based biometric authentication system is very low compared to other authentication system. The main advantage of the fingerprint based authentication system is user friendly. From the fingerprint, we calculate the secret code developed by Maximum-Entropy Expectation-Maximization Algorithm. Request is been sent to the data owner, and the client receives the acknowledgement of accessing the PC through Bluetooth in his mobile. Secret Code Developed by Maximum-Entropy Expectation-Maximization Algorithm Expectation-Maximization (EM) algorithm offers an approximation of the pdf (Probability density functio. by an iterative optimization under the maximum prospect of criterion. Probability density function can be approximated as the sum of Gaussian function Here. Gaussian function center is represented by , where covariance matrix is indicated by center weight is represented by . The Gaussian function is given in below equation AE , and each . | AE From the above two equation . & . , we can observe that the logarithm of the possibility of function for the given Gaussian mixture parameters that has M observations can be written as Here is the Oc Oc sample and . is a set of parameters. IJECE Vol. No. February 2017 : 408 Ae 416 IJECE ISSN: 2088-8708 The entropy term is added in order to make the estimated density function smooth and not to have an impulse OcOc Maximize the entropy value using augmented probable function , augmented probable function is given below: it is parameterizedby a positive scalar ( ) The expectation step of the EM algorithm can be separated into two terms, one is the expectation related with likelihood and the other is the expectation related with the entropy penalty. Oc Here L denotes that this expectation is from the likelihood function. E denotes that this expectation is from the entropy penalty, and t denotes the number of iteration. The lower bound function ( ) for the Likelihood function is given by: OcOc ( ) Lower bound functions ( ) ( ) for the entropy is given below: (Oc Oc OcOc OcOc In the above equation indicated concave function The combination of two lower bounds given another relationship is given below: ( ) Since we have the lower bound function, the new estimates of the parameters are easily calculated by setting the derivatives of ( )with respect to each parameter to zero. Mean The mean vector is calculated by equation: Biometric Identification and Authentication Providence Using Fingerprint for A (A. Amali Mary Bastin. A ISSN: 2088-8708 (Oc Oc (Oc Oc . Weight: Weight parameter is calculated by below equation: Oc Oc . Covariance: Covariance parameter is calculated using below equation: Here is equal to {O . O { O { Using the above equation with symmetry property of Gaussian, we introduce the lower bound for the Oc Oc Then new estimated covariance is obtained by new lower bound setting. This method to prove that this algorithm converges to a local maximum on bound is generated by the CauchyAeSchwartz inequality. This type of inequality is met with equality, when the covariance matrices of the different kernels are equal. IJECE Vol. No. February 2017 : 408 Ae 416 IJECE ISSN: 2088-8708 Advanced Encryption and Decryption Algorithm Encryption and decryption is most important to secure the data in all security development. In this researches, the file has to be hidden is secured by these algorithm. Encryption and Decryption plays an important role in security. The created entropy value is used for decrypting the entropy file, if the entropy value is matched. Advanced Encryption Standard (AES) Algorithm There are two main important parts in AES algorithm, which are data procedures and key schedules. The data procedure is one of the important for encryption, it has four operations: (In. SubBytes, (In. ShiftRows, (In. MixColumns, and (In. AddRoundKey. AES operated in two fields, addition is denoted by Oi, andmultiplication is denoted by O. Similarly, the two symbols. Oi and O, denote addition and multiplication in Each operation is explained below. Subtypes: In this operation, two calculations are involved that are inversion and affine transformation. For each byte in the data block, this operation is assigned by . In the above equation. A is a constant row vector for vector multiplicationover GF . is the inverse of the input byte, circulant vector [ indicates the ith byte of the data block. denotes the matrix- . Shift Rows: Changing the byte position process is obtained through this operation. Assigning different offset for rotating each row and obtain the new state. For example In the above matrix, first row is unchanged, the second row is left circular shifted by one, the third row is by two, and the last row is by three. MixColumns: In this operation, four new bytes are obtained by mixes every consecutive four byte of the state. For example , in which i belongs to { Every consecutive four bytes are represented as four bytes are transformed by In the above matrix, each entry is belongs to Then . AddRoundKey and key Expansion: AddRoundKey operation is simply an addition, in which each round have 128-bit round key and which is segmented in to 16 bytes . , where . Biometric Identification and Authentication Providence Using Fingerprint for A (A. Amali Mary Bastin. A ISSN: 2088-8708 The key expansion expands a unique private key as a key stream of 32-bit words, where r is 10, 12, or 14. The private key is segmented into Nk words according to the key length, where NK is 4, 6, or 8 for a 128-bit, 192-bit, or 256-bitcipher key, respectively. Advanced Decryption Standard Algorithm: Corresponding to the transformations in the encryption. InvSubBytes. InvShiftRows. InvMixColumns, and AddRoundKey are the transformations used in the decryption. InvSubBytes Transformation: It is the inverse transformation ofSub Bytes. InvShiftRows Transformation: It is the inverse transformation of ShiftRows. Here the first is not changed. one byte is shift cyclically to the right for second row, two byte is shifted to right for third row. Finally four byte is shifted cyclically to the right for third row. InvMixColumns Transformation: It is the inverse transformation of InvMixColumns. It is transformed column by column on the state. AddRoundKey: AddRoundKey process is same as the Encryption, but this operation used in reverse order. EXPERIMENTAL RESULTS The proposed system is evaluated in JAVA platform. Here, two emerging trends are used that are cloud and mobile, these two trends are combined and challenging the security performance. Figure 3. Entropy Value for user Fingerprint Figure 4. Authentication received by admin from Figure 5. Authentication Received by Client from Admin Figure 6. Maximum Entropy Value IJECE Vol. No. February 2017 : 408 Ae 416 IJECE ISSN: 2088-8708 Figure 7. Fingerprint Authentication The proposed mobile cloud computing secured the security system through biometric authentication. In this process, the admin registers her/his details such as user name, password and phone number and logins the system with that specified password. Figure 2 gives the entropy value for admin fingerprint. The entropy value is calculated by Maximum-Entropy Expectation-Maximization Algorithm. Figure 3 & 4 illustrates the authentication between the client and admin through Bluetooth. The request is communicated by the client to access the PC is shown in Figure 3, acknowledgment is sent back by the admin is shown in Figure 4. Figure 5 & 6 illustrates the maximum entropy value and fingerprint matching to the database stored in the PC. Then the client accesses the specified folder through this entropy value. CONCLUSION Cloud computing promises the IT companies and provides increased flexibility. One of the key problems is information security. This research presented a controllable security scheme for a cloud storage owner to secure their data. Mobile cloud computing is presented with fingerprint biometric authentication with Maximum Entropy Expectation-Maximization Algorithm which uses to create the secret code. This paper offers cloud storage identify for accessing data or files from PC through anywhere by mobile using fingerprint recognition. REFERENCES